- Issued:
- 2021-03-30
- Updated:
- 2021-03-30
RHSA-2021:0957 - Security Advisory
Synopsis
Moderate: OpenShift Container Platform 4.7.4 security update
Type/Severity
Security Advisory: Moderate
Topic
Red Hat OpenShift Container Platform release 4.7.4 is now available with
updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the container images for Red Hat OpenShift Container
Platform 4.7.4. See the following advisory for the RPM packages for this
release:
https://access.redhat.com/errata/RHSA-2021:0958
Space precludes documenting all of the container images in this advisory.
See the following Release Notes documentation, which will be updated
shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel ease-notes.html
This update fixes the following bugs among others:
- A flaw was found in golang: crypto/elliptic, in which P-224 keys as generated could return incorrect inputs, which reduced the strength of the cryptography. The greatest threat to the system was confidentiality and integrity. (BZ#1918750)
- This update adds new capabilities to the Baremetal Operator, allowing for different reboot modes to be utilized. This allows workloads to be relocated as quickly as possible in the event of a node failure. Additionally, it provides a path for clients to quickly power down systems for remediation purposes and to recover workloads. As a result, workload recovery time is significantly reduced. (BZ#1936407)
You may download the oc tool and use it to inspect release image metadata
as follows:
(For x86_64 architecture)
$ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.6.20-x86_64
The image digest is
sha256:999a6a4bd731075e389ae601b373194c6cb2c7b4dadd1ad06ef607e86476b129
(For s390x architecture)
$ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.6.20-s390x
The image digest is
sha256:90be6b7e97d8da9fbb2afc7fe6d7dd4da6265fb847ec440e46bda1a25c224b0c
(For ppc64le architecture)
$ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.6.20-ppc64le
The image digest is
sha256:475367e4991d6e8ea3617cf3dfe2dd472db76a89f23484f118932d6bdd6f53e9
Security Fix(es):
- golang: crypto/elliptic: incorrect operations on the P-224 curve (CVE-2021-3114)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
All OpenShift Container Platform 4.7 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
at
https://docs.openshift.com/container-platform/4.7/updating/updating-cluster
- between-minor.html#understanding-upgrade-channels_updating-cluster-between
- minor.
Solution
For OpenShift Container Platform 4.7 see the following documentation, which
will be updated shortly for this release, for important instructions on how
to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html
Details on how to access this content are available at
https://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.
Affected Products
- Red Hat OpenShift Container Platform 4.7 for RHEL 8 x86_64
- Red Hat OpenShift Container Platform for Power 4.7 for RHEL 8 ppc64le
- Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.7 for RHEL 8 s390x
Fixes
- BZ - 1910352 - When creating a worker with a used mac-address stuck on registering
- BZ - 1918750 - CVE-2021-3114 golang: crypto/elliptic: incorrect operations on the P-224 curve
- BZ - 1922417 - Issue configuring nodes with VLAN and teaming
- BZ - 1927554 - [sig-devex][Feature:ImageEcosystem][Slow] openshift sample application repositories rails/nodejs/cakephp
- BZ - 1929257 - The KubeletConfigController cannot process multiple confs for a pool/ pool changes
- BZ - 1929371 - 4.7 CNO claims to be done upgrading before it even starts
- BZ - 1929721 - Enable host-based disk encryption on Azure platform
- BZ - 1930106 - Cannot IPI with tang/tpm disk encryption
- BZ - 1930152 - Web console crashes during VM creation from template when no storage classes are defined
- BZ - 1931401 - test: openshift-tests.[sig-cli] oc observe works as expected [Suite:openshift/conformance/parallel]
- BZ - 1931863 - NetworkManager overlay FS not being created on None platform
- BZ - 1931950 - Whereabouts IPv6 addresses not calculated when leading hextets equal 0
- BZ - 1933839 - Panic in OLM packageserver when invoking webhook authorization endpoint
- BZ - 1934645 - [4.7z] Need BFD failover capability on ECMP routes
- BZ - 1935636 - High RAM usage on machine api termination node system oom
- BZ - 1936707 - New CSV using ServiceAccount named "default" stuck in Pending during upgrade
- BZ - 1936803 - Support ServiceBinding 0.5.0+
- BZ - 1936861 - (release-4.7] Configmap gatherer doesn't include namespace name (in the archive path) in case of a configmap with binary data
- BZ - 1937313 - Topology view - vm details screen isntt stop loading
- BZ - 1937469 - Pod/node/ip/template isn't showing when vm is running
- BZ - 1937695 - ironic image "/" cluttered with files
- BZ - 1937829 - ovn-kube must handle single-stack to dual-stack migration
- BZ - 1937998 - [4.7] wrong community catalog image reference
- BZ - 1938405 - catalog operator causing CPU spikes and bad etcd performance
- BZ - 1939218 - Images built on OCP 4.6 clusters create manifests that result in quay.io (and other registries) rejecting those manifests
- BZ - 1939278 - Backport Avoid node disruption when kube-apiserver-to-kubelet-signer is rotated
- BZ - 1939477 - CI tests using openshift/hello-world broken by Ruby Version Update
- BZ - 1940283 - [VPA] Updater failed to trigger evictions due to "vpa-admission-controller" not found
- BZ - 1941297 - OCP-Metal images
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.