Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2021:0308 - Security Advisory
Issued:
2021-02-08
Updated:
2021-02-08

RHSA-2021:0308 - Security Advisory

  • Overview

Synopsis

Important: OpenShift Container Platform 4.6.16 security and bug fix update

Type/Severity

Security Advisory: Important

Topic

Red Hat OpenShift Container Platform release 4.6.16 is now available with
updates to packages and images that fix several bugs.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.

This advisory contains the container images for Red Hat OpenShift Container
Platform 4.6.16. See the following advisory for the RPM packages for this
release:

https://access.redhat.com/errata/RHBA-2021:0309

Space precludes documenting all of the container images in this advisory.
See the following Release Notes documentation, which will be updated
shortly for this release, for details about these changes:

https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html

You may download the oc tool and use it to inspect release image metadata
as follows:

(For x86_64 architecture)

$ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.6.16-x86_64

The image digest is sha256:3e855ad88f46ad1b7f56c312f078ca6adaba623c5d4b360143f9f82d2f349741

(For s390x architecture)

$ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.6.16-s390x

The image digest is sha256:2335685cda334ecf9e12c056b148c483fb81412fbfc96c885dc669d775e1f1ee

(For ppc64le architecture)

$ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.6.16-ppc64le

The image digest is sha256:953ccacf79467b3e8ebfb8def92013f1574d75e24b3ea9a455aa8931f7f17b88

All OpenShift Container Platform 4.6 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
at
https://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.

Security Fix(es):

  • SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183)
  • openshift/builder: privilege escalation during container image builds via mounted secrets (CVE-2021-3344)
  • openshift/installer: Bootstrap nodes allow anonymous authentication on kubelet port 10250 (CVE-2021-20198)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For OpenShift Container Platform 4.6 see the following documentation, which
will be updated shortly for this release, for important instructions on how
to upgrade your cluster and fully apply this asynchronous errata update:

https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html

Details on how to access this content are available at
https://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.

Affected Products

  • Red Hat OpenShift Container Platform 4.6 for RHEL 8 x86_64
  • Red Hat OpenShift Container Platform for Power 4.6 for RHEL 8 ppc64le
  • Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.6 for RHEL 8 s390x

Fixes

  • BZ - 1369383 - CVE-2016-2183 SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)
  • BZ - 1873004 - [downstream] Should indicate the version info instead of the commit info
  • BZ - 1887759 - [release 4.6] Gather MachineConfigPools
  • BZ - 1889676 - [release 4.6] Gather top installplans and their count
  • BZ - 1889865 - operator-registry image needs clean up in /tmp
  • BZ - 1890274 - [4.6] External IP doesn't work if the IP address is not assigned to a node
  • BZ - 1890452 - Adding BYOK disk encryption through DES
  • BZ - 1891697 - Handle missing labels as empty.
  • BZ - 1891892 - The windows oc.exe binary does not have version metadata
  • BZ - 1893409 - [release-4.6] MCDPivotError alert/metric missing
  • BZ - 1893738 - Examining agones helm chart resources results in "Oh no!"
  • BZ - 1894916 - [4.6] Panic output due to timeouts in openshift-apiserver
  • BZ - 1896919 - start creating new-style Secrets for AWS
  • BZ - 1898672 - Pod gets stuck in ContainerCreating state with exhausted Whereabouts IPAM range with a daemonset
  • BZ - 1899107 - [4.6] ironic-api used by metal3 is over provisioned and consumes a lot of RAM
  • BZ - 1899535 - ds/machine-config-daemon takes 100+ minutes to rollout on 250 node cluster
  • BZ - 1901602 - Extra reboot during 4.5 -> 4.6 upgrade
  • BZ - 1901605 - CNO blocks editing Kuryr options
  • BZ - 1903649 - Automated cleaning is disabled by default
  • BZ - 1903887 - dns daemonset rolls out slowly in large clusters
  • BZ - 1904091 - Missing registry v1 protocol usage metric on telemetry
  • BZ - 1904577 - [4.6] Local storage operator doesn't include correctly populate LocalVolumeDiscoveryResult in console
  • BZ - 1905031 - (release-4.6) Collect spec config for clusteroperator resources
  • BZ - 1905195 - [release-4.6] Detecting broken connections to the Kube API takes up to 15 minutes
  • BZ - 1905573 - [4.6] Changing the bound token service account issuer invalids previously issued bound tokens
  • BZ - 1905788 - Role name missing on create role binding form
  • BZ - 1906332 - update discovery burst to reflect lots of CRDs on openshift clusters
  • BZ - 1906741 - KeyError: 'nodeName' on NP deletion
  • BZ - 1906796 - [SA] verify-image-signature using service account does not work
  • BZ - 1907827 - Kn resources are not showing in Topology if triggers has KSVC and IMC as subscriber
  • BZ - 1907830 - "Evaluating rule failed" for "record: cluster:kube_persistentvolumeclaim_resource_requests_storage_bytes:provisioner:sum" and "record: cluster:kubelet_volume_stats_used_bytes:provisioner:sum"
  • BZ - 1909673 - scale up / down buttons available on pod details side panel
  • BZ - 1912388 - [OVN]: `make check` broken on 4.6
  • BZ - 1912430 - thanosRuler.resources.requests does not take effect in user-workload-monitoring-config confimap
  • BZ - 1913109 - oc debug of an init container no longer works
  • BZ - 1913645 - Improved Red Hat image and crashlooping OpenShift pod collection
  • BZ - 1915560 - OCP 4.4.9: EtcdMemberIPMigratorDegraded: rpc error: code = Canceled desc = grpc: the client connection is closing
  • BZ - 1916096 - [oVirt] csi operator panics if ovirt-engine suddenly becomes unavailable.
  • BZ - 1916100 - [oVirt] Consume 23-10 ovirt sdk - csi operator
  • BZ - 1916347 - Updating scheduling component builder & base images to be consistent with ART
  • BZ - 1916857 - configs.imageregistry.operator.openshift.io cluster does not update its status fields after URL change
  • BZ - 1916907 - dns-node-resolver corrupts /etc/hosts if internal registry is not in use
  • BZ - 1917240 - [4.6] Network Policies are not working as expected with OVN-Kubernetes when traffic hairpins back to the same source through a service
  • BZ - 1917498 - Regression OLM uses scoped client for CRD installation
  • BZ - 1917547 - oc adm catalog mirror does not mirror the index image itself
  • BZ - 1917548 - [4.6] Cannot filter the platform/arch of the index image
  • BZ - 1917549 - Failed to mirror operator catalog - error: destination registry required
  • BZ - 1917550 - oc adm catalog mirror command attempts to pull from registry.redhat.io when using --from-dir option
  • BZ - 1917609 - [4.6z] Deleting an exgw causes pods to no longer route to other exgws
  • BZ - 1918194 - with sharded ingresscontrollers, all shards reload when any endpoint changes
  • BZ - 1918202 - Grafana - The resulting dataset is too large to graph (OCS RBD volumes being counted as disks)
  • BZ - 1918525 - OLM enters infinite loop if Pending CSV replaces itself
  • BZ - 1918779 - [Negative Test] After deleting metal3 pod, scaling worker stuck on provisioning state
  • BZ - 1918792 - [BUG] Thanos having possible memory leak consuming huge amounts of node's memory and killing them
  • BZ - 1918961 - [IPI on vsphere] Executing 'openshift-installer destroy cluster' leaves installer tag categories in vsphere
  • BZ - 1920764 - CVE-2021-20198 openshift/installer: Bootstrap nodes allow anonymous authentication on kubelet port 10250
  • BZ - 1920873 - Failure to upgrade operator when a Service is included in a Bundle
  • BZ - 1920995 - kuryr-cni pods using unreasonable amount of CPU
  • BZ - 1921450 - CVE-2021-3344 openshift/builder: privilege escalation during container image builds via mounted secrets
  • BZ - 1921473 - test-cmd is failing on volumes.sh pretty consistently
  • BZ - 1921599 - OCP 4.5 to 4.6 upgrade for "aws-ebs-csi-driver-operator" fails when "defaultNodeSelector" is set

CVEs

  • CVE-2015-8011
  • CVE-2016-2183
  • CVE-2020-14382
  • CVE-2021-3344
  • CVE-2021-20198

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://access.redhat.com/articles/2548661

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat X (formerly Twitter)

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility