Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.3340 OpenShift Container Storage 3.11.z Container Images Security and Bug Fix Update 8 October 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: OpenShift Container Storage 3.11.z Publisher: Red Hat Operating System: Red Hat Impact/Access: Denial of Service -- Remote/Unauthenticated Access Confidential Data -- Remote/Unauthenticated Reduced Security -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2021-31525 CVE-2021-27219 CVE-2021-3114 CVE-2020-25692 CVE-2020-25648 Reference: ESB-2021.2939 ESB-2021.2711 ESB-2021.2657 ESB-2021.2555 Original Bulletin: https://access.redhat.com/errata/RHSA-2021:3748 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: OpenShift Container Storage 3.11.z Container Images Security and Bug Fix Update Advisory ID: RHSA-2021:3748-01 Product: Red Hat Gluster Storage Advisory URL: https://access.redhat.com/errata/RHSA-2021:3748 Issue date: 2021-10-07 CVE Names: CVE-2020-25648 CVE-2020-25692 CVE-2021-3114 CVE-2021-27219 CVE-2021-31525 ===================================================================== 1. Summary: Updated container images that fix various bugs are now available for Red Hat OpenShift Container Storage 3.11 Update 8 in the Red Hat Container Registry. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: The OpenShift Container Storage solution provides persistent storage service for OpenShift Containers and OpenShift Infrastructure services. Security Fix(es): * golang: crypto/elliptic: incorrect operations on the P-224 curve (CVE-2021-3114) * golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. All users of OpenShift Container Storage 3.11 container images are advised to pull these updated images from the Red Hat Container Registry. 3. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 4. Bugs fixed (https://bugzilla.redhat.com/): 1918750 - CVE-2021-3114 golang: crypto/elliptic: incorrect operations on the P-224 curve 1957321 - Respin the rhgs-server-container container to include latest glusterfs rpm for RHGS 3.5.5 1958341 - CVE-2021-31525 golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header 1987163 - respin volmanager to include latest heketi rpm 5. References: https://access.redhat.com/security/cve/CVE-2020-25648 https://access.redhat.com/security/cve/CVE-2020-25692 https://access.redhat.com/security/cve/CVE-2021-3114 https://access.redhat.com/security/cve/CVE-2021-27219 https://access.redhat.com/security/cve/CVE-2021-31525 https://access.redhat.com/security/updates/classification/#moderate 6. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYV8B9NzjgjWX9erEAQjIbg/9HauH9Hr3hzSlXKlnIFcpBv6dAdqK1vNV dYlBxkPpOrmB2EahAcP7ByhjmaEEUEivm/mnKWDE+tasLVRmFmlwBy9dmYF244KL i/eYVlv2XGjIKqY4FwFHU9R7f5VyHkMU9ON//T9WDoq43be8JSZgRS6P/y6BjBhd 0VYmff0QtAcE464NPV0efi29+LX2ve50MUV9LxllfKv+8GKJygqij4ghOSVG78xi C7/eyEBOPX1Ma/ZZup6v4LDFsUz41TsGlkj6vb8CmizDCAy4QUW9Y6hJooeDs1R9 yppzWJN4cGRto2AnnW4wOAWmdhAtfimcsOkXWmLsnBBQ18aqYKY/ITEZMaEVUmtx Ixk42RzlhvUYorBdmJucInrAwWbxenjHesGrms5iUlDtjAIN67hfcY8gbgBhGN9A nEJNQT8YzoWIAVn2hyvPOh2yLCDlacPLbScM2ykfE+ZDd2CXRyt1YKLpH0FEb7jx ArxEoyU1KDtxs5d37uutx3ksC/FJIIck9N8tv/tYjpeM40q2aeFH38A6ZVSC94WM WOefMLikD6XIxi4CpBSM853bgZ8tYbPFN3HEe47Tah3cBhLGH59y/Ue3uYdLJayE OqVZU4INs4Oh7WK8SJ+h7JXpLfz+2nfEhq65noYwrSH1Ozy9vcjrUv3LgSRRTGG+ UohzPRFG/Es= =qCME - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYV+W2ONLKJtyKPYoAQjJ6A/9EaMdQMDFeEwSBqSQy9uJC0ml3fMdBQBl KbJ1vF6wMWYGqiuQA32Zs8cNwm2YD7jw/NUnGbdhbGPBGG7s4dixC0kt2ujvRrK9 FID5vcSo7iktGiGKgNHNwzvzG2ItdcNCn+KdJnOwXjpouow18UA4g1TyLPI3BaOw y49GX3Grto2m12D1PuPL6IzqnwDB2HQBhMvRJqUOUnlPV+eAy89naXOD1htjW5H/ MpLRw8XoDBx9xy0mNRwbUf7U1GXkwj/yZGytTucjSXNAQlYOdfhQn7b6mFlxVech 48yXoKlBWZhE9olMM5RhA8xpLRbsjkJONV3HrgEVODtpP8sj3JtVDFXFb+igCuXs ouf2Yti78MUvChv5d78eFzYksphjNjS4+8B/+XnHwgHYsHW/8VMwAWrfHAhnyBQa 63vLNavgyQ1Iz8aIc3Gb5g+NAEqXvEvrDuIcDZLifSkf9gK1zXd0Niyy+5j19IUC cvJbj9ngcsXAkEIZHDhZRzGfxlh0QKXc89aKIuB58iytjHfnx6GuIEFC2J71hkfQ itr5su+sCaPVFaXaZjoZXxYJOkYKuUgxDOHBtGn0C3miBAvSvCzGxo5RdtWapmbI bEw+t4yieuixbH8o5Ub9ybtXvJFbwzoau45BeGB+kW/uIlA7sK90dLhowDETNXM3 VUVCrMPILeg= =qgWL -----END PGP SIGNATURE-----