- Issued:
- 2021-03-03
- Updated:
- 2021-03-03
RHSA-2021:0428 - Security Advisory
Synopsis
Important: OpenShift Container Platform 4.5.33 bug fix and security update
Type/Severity
Security Advisory: Important
Topic
Red Hat OpenShift Container Platform release 4.5.33 is now available with
updates to packages and images that fix several bugs and add enhancements.
This release also includes a security update for Red Hat OpenShift Container Platform 4.5.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
Description
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
Security Fix(es):
- openshift/builder: privilege escalation during container image builds via mounted secrets (CVE-2021-3344)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
This advisory contains the container images for Red Hat OpenShift Container Platform 4.5.33. See the following advisory for the RPM packages for this release:
https://access.redhat.com/errata/RHSA-2021:0429
Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html
You may download the oc tool and use it to inspect release image metadata as follows:
(For x86_64 architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.5.33-x86_64
The image digest is sha256:8e6b3ffc19aa6106096936733a128095646a604b69924b5cf606260d433661f0
(For s390x architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.5.33-s390x
The image digest is sha256:c7085a4d27da05bd733e5ad72b74f6a1b55548badeb71ce050e88baaf4fcf575
(For ppc64le architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.5.33-ppc64le
The image digest is sha256:102c2dff98f2dab4cf975a02b3cf9fa24ce1e0e10650113e94e5d07420ac10d3
All OpenShift Container Platform 4.5 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available
at https://docs.openshift.com/container-platform/4.5/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.
Solution
For OpenShift Container Platform 4.5 see the following documentation, which
will be updated shortly for this release, for important instructions on how
to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html
Details on how to access this content are available at
https://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.
Affected Products
- Red Hat OpenShift Container Platform 4.5 for RHEL 8 x86_64
- Red Hat OpenShift Container Platform 4.5 for RHEL 7 x86_64
- Red Hat OpenShift Container Platform for Power 4.5 for RHEL 8 ppc64le
- Red Hat OpenShift Container Platform for Power 4.5 for RHEL 7 ppc64le
- Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.5 for RHEL 8 s390x
- Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.5 for RHEL 7 s390x
Fixes
- BZ - 1849154 - [4.5] readinessEndpoint not using trustedCA for trust validation
- BZ - 1877346 - KubeAPIErrorsHigh firing due to "too large resource version"
- BZ - 1879208 - APIServer panic'd: net/http: abort Handler
- BZ - 1879901 - [release 4.5] Top-level cross-platform: Fix bug in reflector not recovering from "Too large resource version"
- BZ - 1884195 - Possible to delete 2 masters simultaneously if kubelet unreachable
- BZ - 1887763 - [release 4.5] Gather MachineConfigPools
- BZ - 1889679 - [release 4.5] Gather top installplans and their count
- BZ - 1891455 - EgressNetworkPolicy does not work when setting Allow rule to a dnsName
- BZ - 1891545 - [release 4.5] Add ContainerRuntimeConfig gatherer
- BZ - 1892372 - operator pod with OLM webhooks is getting terminated and created several times during the installation
- BZ - 1894243 - [Backport 4.5] IO archive contains more records of than is the limit
- BZ - 1896079 - Package Server is in 'Cannot update' status despite properly working
- BZ - 1904584 - Operator upgrades can delete existing CSV before completion
- BZ - 1905576 - [4.5] Changing the bound token service account issuer invalids previously issued bound tokens
- BZ - 1905991 - [release-4.5] Detecting broken connections to the Kube API takes up to 15 minutes
- BZ - 1914255 - Red Hat image and crashlooping OpenShift pod collection
- BZ - 1916660 - AggregatedAPIDown permanently firing after removing APIService
- BZ - 1916859 - configs.imageregistry.operator.openshift.io cluster does not update its status fields after URL change
- BZ - 1918962 - [IPI on vsphere] Executing 'openshift-installer destroy cluster' leaves installer tag categories in vsphere
- BZ - 1920421 - Too many haproxy processes in default-router pod causing high load average
- BZ - 1920676 - Must-gather and inspect should put a timestamp when it started and finished into the tar
- BZ - 1921283 - fix MCS blocking iptables rules
- BZ - 1921450 - CVE-2021-3344 openshift/builder: privilege escalation during container image builds via mounted secrets
- BZ - 1921484 - Regression OLM uses scoped client for CRD installation
- BZ - 1922262 - [4.5.z] real-time kernel in RHCOS is not synchronized
- BZ - 1924137 - Increase initialDelaySeconds for ovs-daemons container in the ovs-node daemonset for upgrade scenarios
- BZ - 1924913 - A valid etcd endpoint should have the URL scheme prepended
- BZ - 1925678 - Placeholder bug for OCP 4.5.z rpm release
- BZ - 1925679 - Placeholder bug for OCP 4.5.z extras release
- BZ - 1925680 - Placeholder bug for OCP 4.5.z metadata release
- BZ - 1926564 - [release-4.5] OCP installs fail on ppc64le/s390x in the bootstrap phase
- BZ - 1926730 - Large number of tcp connections with shiftstack ocp cluster in about 24 hours
- BZ - 1928263 - catalog operator causing CPU spikes and bad etcd performance
CVEs
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.