-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.2388
      OpenShift Container Platform 4.6.38 extras and security update
                               15 July 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           OpenShift Container Platform
Publisher:         Red Hat
Operating System:  Red Hat
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
                   Access Confidential Data        -- Remote/Unauthenticated
                   Reduced Security                -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-3583 CVE-2021-3570 CVE-2020-36329
                   CVE-2020-36328 CVE-2020-7598 CVE-2018-25011

Reference:         ESB-2021.2070
                   ESB-2020.3081
                   ESB-2020.2488

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2021:2643

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: OpenShift Container Platform 4.6.38 extras and security update
Advisory ID:       RHSA-2021:2643-01
Product:           Red Hat OpenShift Enterprise
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:2643
Issue date:        2021-07-14
CVE Names:         CVE-2018-25011 CVE-2020-7598 CVE-2020-36328 
                   CVE-2020-36329 CVE-2021-3570 CVE-2021-3583 
=====================================================================

1. Summary:

Red Hat OpenShift Container Platform release 4.6.38 is now available with
updates to packages and images that fix several bugs.

This release includes a security update for Red Hat OpenShift Container
Platform 4.6.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.

This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 4.6.38. See the following advisory for the container images for
this release:

https://access.redhat.com/errata/RHBA-2021:2641

Security Fix(es):

* nodejs-minimist: prototype pollution allows adding or modifying
properties of Object.prototype using a constructor or __proto__ payload
(CVE-2020-7598)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

All OpenShift Container Platform 4.6 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
at
https://docs.openshift.com/container-platform/4.6/updating/updating-cluster
- - -between-minor.html#understanding-upgrade-channels_updating-cluster-between
- - -minor

3. Solution:

For OpenShift Container Platform 4.6 see the following documentation, which
will be updated shortly for this release, for important instructions on how
to upgrade your cluster and fully apply this asynchronous errata update:

https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-rel
ease-notes.html

Details on how to access this content are available at
https://docs.openshift.com/container-platform/4.6/updating/updating-cluster
- - -cli.html

4. Bugs fixed (https://bugzilla.redhat.com/):

1813344 - CVE-2020-7598 nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload
1979134 - Placeholder bug for OCP 4.6.0 extras release

5. References:

https://access.redhat.com/security/cve/CVE-2018-25011
https://access.redhat.com/security/cve/CVE-2020-7598
https://access.redhat.com/security/cve/CVE-2020-36328
https://access.redhat.com/security/cve/CVE-2020-36329
https://access.redhat.com/security/cve/CVE-2021-3570
https://access.redhat.com/security/cve/CVE-2021-3583
https://access.redhat.com/security/updates/classification/#moderate

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBYO6Tt9zjgjWX9erEAQguBg/8CSDhWG+F35tgSsXJSeVCjmvQuDsfzMFZ
gx8H0uu5Ww60Wy1TEnxM/fG/Vb0eNANbQfnIorWfRMfvNypzDh/THlezeztYYC39
JsEwPtjQqKgsmbXx65figR8+zGwLdKd18BUq+XofBrbc0mGW0RYsQ0h6kBUIUYks
/SV91Ym0shG/75hzZuFD7KYmtVhqw6HEN5kxWXF80rQNrkuBSgwXXuSq3SCvFH8T
ailI2sTcV4zKRA6nGznEIYR2Bd+5ZubYkBziJt9aNd/eAtomS5JhiCj+R6o/nWl7
jfpHllriMIiiA3uIC34Vw4U8MXjInJzsriaA40/3VsbZvcr9IqWl34JN0DrjAWrJ
bBpadfhG4S+mAUsPXlEiA9D4Dk9SUWLaJ3ZdCPArQ/JxIeM0k0UN1lA5UfmTvhqa
e7E9S/Z7qn2Q2QGfORHB2kjLYMdSfbg5egGXdMKdS0fjL4FpsmEITnb2vTnIInni
YSpitq+JCd3I6vRQJHIgsWEJy2Zca9a6UYG7AtMe9H43Uo6H8T1heBkH8ddu7WJr
Fpx8/ap0A5G4kjm02WjUOIQuw8BBCSuQTqHl8gwwa59J5H7kz0BFiQ3G3ALD9gO8
Sd9z7GjISNuSbDVLogz6Nvi8oh9tn4oh6MdAJXkZfEQEZnMIxmHdFDf4aTvwMUQN
CjQl5u3P0UE=
=2NbC
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=WJfH
-----END PGP SIGNATURE-----