-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0446
      OpenShift Container Platform 4.5.31 bug fix and security update
                             10 February 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           OpenShift Container Platform 4.5.31
Publisher:         Red Hat
Operating System:  Red Hat
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
                   Access Confidential Data        -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-20198 CVE-2020-14382 

Reference:         ESB-2021.0438
                   ESB-2021.0437

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2021:0313

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: OpenShift Container Platform 4.5.31 bug fix and security update
Advisory ID:       RHSA-2021:0313-01
Product:           Red Hat OpenShift Enterprise
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:0313
Issue date:        2021-02-09
CVE Names:         CVE-2020-14382 CVE-2021-20198 
=====================================================================

1. Summary:

Red Hat OpenShift Container Platform release 4.5.31 is now available with
updates to packages and images that fix several bugs.

This release also includes a security update for Red Hat OpenShift
Container Platform 4.5.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.

This advisory contains the container images for Red Hat OpenShift Container
Platform 4.5.31. See the following advisory for the RPM packages for this
release:

https://access.redhat.com/errata/RHBA-2021:0314

Space precludes documenting all of the container images in this advisory.
See the following Release Notes documentation, which will be updated
shortly for this release, for details about these changes:

https://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-rel
ease-notes.html

You may download the oc tool and use it to inspect release image metadata
as follows:

(For x86_64 architecture)

  $ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.5.31-x86_64

The image digest is
sha256:27951dd757d472bf913daaffa548b865e87968831ca6f42c1f6946f7dcf0564e

(For s390x architecture)

  $ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.5.31-s390x

The image digest is
sha256:4ee2c785e4a3b1cb0716e84d649a1489d7a72f6735ffd7a3a933218609cb58ec

(For ppc64le architecture)

  $ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.5.31-ppc64le

The image digest is
sha256:8469f7f1f98d595f503c7ebc1df2f3c2755012441d4d21684914db45193a55ef

All OpenShift Container Platform 4.5 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
at
https://docs.openshift.com/container-platform/4.5/updating/updating-cluster
- - -between-minor.html#understanding-upgrade-channels_updating-cluster-between
- - -minor.

Security Fix(es):

* openshift/installer: Bootstrap nodes allow anonymous authentication on
kubelet port 10250 (CVE-2021-20198)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

For OpenShift Container Platform 4.5 see the following documentation, which
will be updated shortly for this release, for important instructions on how
to upgrade your cluster and fully apply this asynchronous errata update:

https://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-rel
ease-notes.html

Details on how to access this content are available at
https://docs.openshift.com/container-platform/4.5/updating/updating-cluster
- - -cli.html.

4. Bugs fixed (https://bugzilla.redhat.com/):

1880333 - [release 4.5] machine-config-operator: Fix bug in reflector not recovering from "Too large resource version"
1882694 - [4.5] PIN OVS version for OVN-Kubernetes
1895202 - Helm chart fails to install using developer console because of TLS certificate error
1905106 - (release-4.5) Collect spec config for clusteroperator resources
1919848 - Placeholder bug for OCP 4.5.z rpm release
1920764 - CVE-2021-20198 openshift/installer: Bootstrap nodes allow anonymous authentication on kubelet port 10250
1921252 - with sharded ingresscontrollers, all shards reload when any endpoint changes

5. References:

https://access.redhat.com/security/cve/CVE-2020-14382
https://access.redhat.com/security/cve/CVE-2021-20198
https://access.redhat.com/security/updates/classification/#important

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBYCKTz9zjgjWX9erEAQiz0RAApBxS7Ml5xWuBMKrm+Ntux7Jn0ybjvyGR
F2GCtQV1XrZ7HFPGUF7mT4IsQc/tt6JPi6A48L9/r4cs6+6Lr30LYAeSP7pyZtcA
w5lbN/Q/y3VPVCCbJQOCg47w4S3SJmCCV51np0uFfa1V+shh75x4k2+ej1TQBku5
GRyaEfTZOcFfGUOPID5/SwoMHu43BKzf3XXuSY/JPLuRI2M0bm9GHrHvhKkC87nF
9uocCGNZBgJKTNJFsyZEBZnw9/rOXmt4OgqJ7lcrbSnrDraopCEqZcAZfXj7T+Th
1urGpxmh0VZTRfoYMnZLpY88WLVtpRvXo7vgAhjicXPcINNNLTfm5fILbwpbs+Qb
zqarWzzt8ToTMphDFmNkvrREfwd4MQRobMUYrq+dC6RDRJA6HM5K5UA/wSRuTc9J
kgNdVQI+waMcH4bWo+VcdBCxF8nijuOA6LQaWGcxaJ280a0ZzM5wgUP5bvctUn7t
nrjYgUchWA8bwA1ydeEGBdnU4CQ8XmZVslAURi42SGf0JLsESq0+qV2LERjbW8RY
WmzvaWi2jET3vhZSysgeICzZMfcGwRw8BaUZ9Drr30jn80l3RSVh/5bUT1qXAZnz
GasGJhl7fc8ubaMYCjz5txOMF+b9Rcj8yKzTa5QBtIlnuF2bU/AL9DbL2BT7lz3R
zg7YwconLzc=
=YI/B
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=PPkQ
-----END PGP SIGNATURE-----