Operating System:

[RedHat]

Published:

09 September 2021

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.3039
      OpenShift Container Platform 4.7.29 bug fix and security update
                             9 September 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           OpenShift Container Platform
Publisher:         Red Hat
Operating System:  Red Hat
Impact/Access:     Denial of Service -- Remote/Unauthenticated
                   Reduced Security  -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-3121  

Reference:         ESB-2021.2730
                   ESB-2021.1119

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2021:3303

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: OpenShift Container Platform 4.7.29 bug fix and security update
Advisory ID:       RHSA-2021:3303-04
Product:           Red Hat OpenShift Enterprise
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:3303
Issue date:        2021-09-08
CVE Names:         CVE-2021-3121 
=====================================================================

1. Summary:

Red Hat OpenShift Container Platform release 4.7.29 is now available with
updates to packages and images that fix several bugs and add enhancements.

This release includes a security update for Red Hat OpenShift Container
Platform 4.7.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.

This advisory contains the container images for Red Hat OpenShift Container
Platform 4.7.29. See the following advisory for the RPM packages for this
release:

https://access.redhat.com/errata/RHBA-2021:3304

Space precludes documenting all of the container images in this advisory.
See the following Release Notes documentation, which will be updated
shortly for this release, for details about these changes:

https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel
ease-notes.html

Security Fix(es):

* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index
validation (CVE-2021-3121)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

You may download the oc tool and use it to inspect release image metadata
as follows:

(For x86_64 architecture)

  $ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.7.29-x86_64

The image digest is
sha256:b10034bedb4bf08a393462caf4c3fac8f9e4646d3b49d05915850dce0145cf15

(For s390x architecture)

  $ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.7.29-s390x

The image digest is
sha256:19794cea3ec0e319223b38926e9a5356f0daa1594238ea620d83f6689777b11f

(For ppc64le architecture)

  $ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.7.29-ppc64le

The image digest is
sha256:38484e753414060210bddef0e0d771ac5fe89f50272c9a959547195ac1615c05

All OpenShift Container Platform 4.7 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
at
https://docs.openshift.com/container-platform/4.7/updating/updating-cluster
- - -between-minor.html#understanding-upgrade-channels_updating-cluster-between
- - -minor

3. Solution:

For OpenShift Container Platform 4.7 see the following documentation, which
will be updated shortly for this release, for important instructions on how
to upgrade your cluster and fully apply this asynchronous errata update:

https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel
ease-notes.html

Details on how to access this content are available at
https://docs.openshift.com/container-platform/4.7/updating/updating-cluster
- - -cli.html

4. Bugs fixed (https://bugzilla.redhat.com/):

1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
1960103 - SR-IOV obliviously reboot the node
1967359 - [ocp_4][4.7][apiserver-auth] OAuth API servers are not ready - PreconditionNotReady
1972430 - Adopt failure can trigger deprovisioning
1976242 - [4.7.z backport] Upgrade from Openshift 4.5 -> 4.6 Results in Orphaned Address sets
1994601 - OLM dependencies not fixing version
1995199 - After unexpected power outage some nodes could not start anything via crio
1995579 - linuxptp-daemon crash on 4.8
1995910 - Backport ovnkube-trace requires iproute to be installed in the pod to 4.7.z
1996698 - Placeholder bug for OCP 4.7.0 metadata release
1996846 - Apiserver liveness probe is marking it as unhealthy during normal shutdown
1997104 - [OVN] EgressIP no longer worked after a cluster upgrade
1998996 - Placeholder bug for OCP 4.7.0 rpm release
1998997 - Placeholder bug for OCP 4.7.0 extras release
1998998 - Placeholder bug for OCP 4.7.0 metadata release

5. References:

https://access.redhat.com/security/cve/CVE-2021-3121
https://access.redhat.com/security/updates/classification/#moderate

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=fXPC
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=dWTa
-----END PGP SIGNATURE-----