Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.2388 OpenShift Container Platform 4.6.38 extras and security update 15 July 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: OpenShift Container Platform Publisher: Red Hat Operating System: Red Hat Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Access Confidential Data -- Remote/Unauthenticated Reduced Security -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2021-3583 CVE-2021-3570 CVE-2020-36329 CVE-2020-36328 CVE-2020-7598 CVE-2018-25011 Reference: ESB-2021.2070 ESB-2020.3081 ESB-2020.2488 Original Bulletin: https://access.redhat.com/errata/RHSA-2021:2643 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: OpenShift Container Platform 4.6.38 extras and security update Advisory ID: RHSA-2021:2643-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2021:2643 Issue date: 2021-07-14 CVE Names: CVE-2018-25011 CVE-2020-7598 CVE-2020-36328 CVE-2020-36329 CVE-2021-3570 CVE-2021-3583 ===================================================================== 1. Summary: Red Hat OpenShift Container Platform release 4.6.38 is now available with updates to packages and images that fix several bugs. This release includes a security update for Red Hat OpenShift Container Platform 4.6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.38. See the following advisory for the container images for this release: https://access.redhat.com/errata/RHBA-2021:2641 Security Fix(es): * nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. All OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.6/updating/updating-cluster - - -between-minor.html#understanding-upgrade-channels_updating-cluster-between - - -minor 3. Solution: For OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-rel ease-notes.html Details on how to access this content are available at https://docs.openshift.com/container-platform/4.6/updating/updating-cluster - - -cli.html 4. Bugs fixed (https://bugzilla.redhat.com/): 1813344 - CVE-2020-7598 nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload 1979134 - Placeholder bug for OCP 4.6.0 extras release 5. References: https://access.redhat.com/security/cve/CVE-2018-25011 https://access.redhat.com/security/cve/CVE-2020-7598 https://access.redhat.com/security/cve/CVE-2020-36328 https://access.redhat.com/security/cve/CVE-2020-36329 https://access.redhat.com/security/cve/CVE-2021-3570 https://access.redhat.com/security/cve/CVE-2021-3583 https://access.redhat.com/security/updates/classification/#moderate 6. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYO6Tt9zjgjWX9erEAQguBg/8CSDhWG+F35tgSsXJSeVCjmvQuDsfzMFZ gx8H0uu5Ww60Wy1TEnxM/fG/Vb0eNANbQfnIorWfRMfvNypzDh/THlezeztYYC39 JsEwPtjQqKgsmbXx65figR8+zGwLdKd18BUq+XofBrbc0mGW0RYsQ0h6kBUIUYks /SV91Ym0shG/75hzZuFD7KYmtVhqw6HEN5kxWXF80rQNrkuBSgwXXuSq3SCvFH8T ailI2sTcV4zKRA6nGznEIYR2Bd+5ZubYkBziJt9aNd/eAtomS5JhiCj+R6o/nWl7 jfpHllriMIiiA3uIC34Vw4U8MXjInJzsriaA40/3VsbZvcr9IqWl34JN0DrjAWrJ bBpadfhG4S+mAUsPXlEiA9D4Dk9SUWLaJ3ZdCPArQ/JxIeM0k0UN1lA5UfmTvhqa e7E9S/Z7qn2Q2QGfORHB2kjLYMdSfbg5egGXdMKdS0fjL4FpsmEITnb2vTnIInni YSpitq+JCd3I6vRQJHIgsWEJy2Zca9a6UYG7AtMe9H43Uo6H8T1heBkH8ddu7WJr Fpx8/ap0A5G4kjm02WjUOIQuw8BBCSuQTqHl8gwwa59J5H7kz0BFiQ3G3ALD9gO8 Sd9z7GjISNuSbDVLogz6Nvi8oh9tn4oh6MdAJXkZfEQEZnMIxmHdFDf4aTvwMUQN CjQl5u3P0UE= =2NbC - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYO9xWONLKJtyKPYoAQhm9A//Wl1YROp0TD/ZH42oCr7jyojvc4gzEhl5 8Km1bWWVClG3J/r7gLTdQ3LlVFtuRuvFzf0n/tAtLo7S/3ClfJhM5XoXcjwVwue5 ZuYGmYxjiL9y08NVXgPKmIXdLok+QND0uzZZT2Exs/OQVCac9crHsZoWrv6lYx52 XH2WZZtAVNfLv3Y0ECo8oyhDX/Shfsim6AiiULvuS0JzOCpadkFAiVAFZE4cko69 O6arTjpWqnhT4BUmvJJNUiKCYA3XseV7JENxR/Hw5whmlsp7N3yvACl3AuFpWBUp f75obv2wBJbZ5rFfCFfnrz30yVMQYhddc6VuT+xdH1BN4DU+08lNt3ACxN2YBufC sHjlIL8AgoCIBoHEXoAM19RdhA0SWUbbLDRiTXKPIunVDa3chRtr9lWJhsz+Lx1z xrArbVc6ZCZ6MXRDw+Is0KF/HdNdADqMidyq1vRP74h7PfJZf1f/zwut/h5c4KBQ 1FRTu2UhGq73IpBvPo4ZM86rFnc7BNfTpyvdwZRfI1v0HKWcItiul+R9Yvrzac1r ZIx2Bl3cHTzWqK4KANZMX/ayOxP72ebiJIogv6ZwLhycjAfD1xSy6qsfZoJwgFrX EEIF3R41p7fcaAijMD8GRYSiX/K7ZN3l80Yg7Uj76DaaC1XSSaUiJ0tsNiPH+zy1 HPZJS/AFt+s= =WJfH -----END PGP SIGNATURE-----