Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.0928 OpenShift Container Platform 4.10.52 security update 16 February 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: OpenShift Container Platform 4.10.52 Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2022-47629 CVE-2022-41903 CVE-2022-38023 CVE-2022-34174 CVE-2022-23521 CVE-2022-3064 CVE-2022-1471 Original Bulletin: https://access.redhat.com/errata/RHSA-2023:0698 Comment: CVSS (Max): 9.8 CVE-2022-47629 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: OpenShift Container Platform 4.10.52 security update Advisory ID: RHSA-2023:0698-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2023:0698 Issue date: 2023-02-15 CVE Names: CVE-2022-1471 CVE-2022-3064 CVE-2022-23521 CVE-2022-34174 CVE-2022-38023 CVE-2022-41903 CVE-2022-47629 ===================================================================== 1. Summary: Red Hat OpenShift Container Platform release 4.10.52 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.52. See the following advisory for the RPM packages for this release: https://access.redhat.com/errata/RHSA-2023:0697 Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes: https://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html Security Fix(es): * go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents (CVE-2022-3064) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * [4.10] Prevent redundant queries of BIOS settings in HostFirmwareController (BZ#2061794) * ovn-nbctl.log is never rotated (BZ#2072601) * [4.10] APIRemovedInNextEUSReleaseInUse alert for OVN poddisruptionbudgets (BZ#2092193) All OpenShift Container Platform 4.10 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html 3. Solution: For OpenShift Container Platform 4.10 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html You may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags. The sha values for the release are: (For x86_64 architecture) The image digest is sha256:b13ee67469f7f85a1b1daf57424f3c7c02c3a188cb640dc6284742091a7e6d50 (For s390x architecture) The image digest is sha256:4c776be05c475ee885829444509258b486d79d8128e12d6d2263ab7cdef83ce8 (For ppc64le architecture) The image digest is sha256:2d4e0af6ca2afc8c10d210aa520aba602618f3fad4cb42636bddb57b1f0ce425 (For aarch64 architecture) The image digest is sha256:7cadaaf6e0f71645864963e6c47c75852ce68aff80c963dfba2ddf51c0b836c4 All OpenShift Container Platform 4.10 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html 4. Bugs fixed (https://bugzilla.redhat.com/): 2061794 - [4.10] Prevent redundant queries of BIOS settings in HostFirmwareController 2072601 - ovn-nbctl.log is never rotated 2092193 - [4.10] APIRemovedInNextEUSReleaseInUse alert for OVN poddisruptionbudgets 2163037 - CVE-2022-3064 go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents 5. JIRA issues fixed (https://issues.jboss.org/): OCPBUGS-2106 - intra namespace allow network policy doesn't work after applying ingress&egress deny all network policy OCPBUGS-2614 - e2e-gcp-builds is permafailing OCPBUGS-2982 - [release-4.10] Update blueocean-autofavorite to 1.2.5 OCPBUGS-3615 - [4.10] [perf/scale] libovsdb builds transaction logs but throws them away OCPBUGS-4095 - Various Jenkins CVEs for October 2022 [openshift-4.10.z] OCPBUGS-4578 - Origin tests for bonds - 4.10 backport OCPBUGS-4882 - [2117255] Failed to dump flows for flow sync, stderr: "ovs-ofctl: br-ext is not a bridge or a socket" OCPBUGS-5077 - Service spec value `externalTrafficPolicy` does not trigger rules update in ovnkube-node pod handlers on edit OCPBUGS-5296 - Developer Topology always blanks with large contents when first rendering OCPBUGS-5961 - Add support for API version v1beta1 for knativeServing and knativeEventing OCPBUGS-6690 - OLM details page crashes on incomplete ClusterServiceVersion resource OCPBUGS-6702 - The MCO can generate a rendered config with old KubeletConfig contents, blocking upgrades OCPBUGS-6754 - Topology gets stuck loading OCPBUGS-6886 - [4.10] boot sequence override request fails with Base.1.8.PropertyNotWritable on Lenovo SE450 OCPBUGS-6930 - hack/check-plugins-supply-chain-change.sh is not executable OCPBUGS-7052 - Sync jenkins-version.txt, base-plugins.txt and bundle-plugins.txt from master branch 6. References: https://access.redhat.com/security/cve/CVE-2022-1471 https://access.redhat.com/security/cve/CVE-2022-3064 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE-2022-34174 https://access.redhat.com/security/cve/CVE-2022-38023 https://access.redhat.com/security/cve/CVE-2022-41903 https://access.redhat.com/security/cve/CVE-2022-47629 https://access.redhat.com/security/updates/classification/#moderate https://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html 7. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBY+0kZ9zjgjWX9erEAQjaJxAAqF+IAiwuWfRcYGBXUwA/K3P+44YgTiVo xISaecxqI5ybSvMPCzFHftDSntW6nhIUFpSC2xIsvzsEIEvT8TFR09NAtGv57kzK 8nbqNMc+orQhRYe8qNE/kadzQOEpDuM/Ni72anrFDoD7/oFMkoLur1TtBhYG067J AyCiSMYF3IA2K9hPapoa9DmjAF+K6XKHrlP4pmdT3bw152BCfQ0K/wb/4tDGUgym TH6r7dK3MkKJY+hkx4Rf8O8wRyodMID5tuLeQl9zhsOPHVE+S1T8fWzRkHYMpx1T p9IL8mXJs6f5hDR+ZyRr6tLlA36Glaqbpk1sfij96USYC8n7AtOtwY092SmHz3GO +OEwiL5Vnk6VgQIxweZ5SZgLUXsTkUYelXFeLUG2TRqw24kjMUqOpql1S/Ps/R6n zlnaA2wD+fjYpTv72XKMiaHxsuY36Ys+RWnxOXGDKBrn9yYerwV9iAqKFv3MumkA LIXGqkXigGEeNFiaxDPyoeCWW4UxFnGTv1J4JDfRHLIuUNU6ETe/a4Lwy4niaF6m Wqd7GqzHcrI/XTMoQyT1VwbKVYLl80F/mEDbxsxXep8Bxck5UbYjm8ta0U5zDxIB v3RYCBXm8egt1Y2En6Ul6X4ZM+ePFDlde87cn3wANF6WfikehXenLXwnQBXOebT4 7rSPY9B2p+A= =wyNJ - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBY+2J88kNZI30y1K9AQgw/xAAhbjeZKbF33ebHX9kb6IrnlJEVNlv5bfl zH3vndR3qkrNayPhR44eURfFZO7+SYq0uM5sqGVgwdp9FM3ZvCQdbEhIJp/3TNCk 7iozSaDFrqiZOjUNjiuy5vTXfut62v2kUsMhefqhivx+bRpwzIR1rsxcmuBV32H9 mBCtkMU9VMJTVUP4QgOIFK94qHWFIH4j+T7oSbeF0d047CbdQ//3PY4hLAc72baR IZvJu8Lqi/AwezJy71eSfSVq3rYnmTdkvZCAy0MFPHXQccWgAImk7jyp118sgzPR cA5tOZA2s7XS5Ac1uCzhJ5nMbY96PnoZJwJj3YV+SltfqLaq4ynVvU4Xi5Blz3OT l7wNDQ8sClPDd2VdBmglQCtvML/3heMXtUISdeo/X24Uc/uBjPKioIJ7wIlmFrP8 Dw1huF4F5XxmEeAjgTKicE1PCEuCEP2+X9tGlrpScHaNyQX6yqWfG6VpIQ7ed5YQ pI6YrsXiq8nk7j5bR535bThmoSKN5fdz75n2GA84ycHEAP8DG1BKt2ylY+Aa44FL r4CwbRx2awL4BCVUleGEriG9XhXnoHU3lgMZLHkdNFulBDI36zsIC204+7JvSS7m iCE0s8EDhTfJoQ/6XL1doV6wjVmlxeAUPAYz3a19Lkrep+yR7iZ8IEC8/+VuFlZ5 aQX1xGkHY2o= =We2C -----END PGP SIGNATURE-----