- Issued:
- 2022-04-21
- Updated:
- 2022-04-21
RHSA-2022:1356 - Security Advisory
Synopsis
Moderate: OpenShift Container Platform 4.10.10 bug fix and security update
Type/Severity
Security Advisory: Moderate
Topic
Red Hat OpenShift Container Platform release 4.10.10 is now available with
updates to packages and images that fix several bugs and add enhancements.
This release includes a security update for Red Hat OpenShift Container Platform 4.10.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Description
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.10. See the following advisory for the RPM packages for this release:
https://access.redhat.com/errata/RHBA-2022:1355
Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html
Security Fix(es):
- prometheus/client_golang: Denial of service using
InstrumentHandlerCounter (CVE-2022-21698)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s)
listed in the References section.
You may download the oc tool and use it to inspect release image metadata as follows:
(For x86_64 architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.10.10-x86_64
The image digest is sha256:39efe13ef67cb4449f5e6cdd8a26c83c07c6a2ce5d235dfbc3ba58c64418fcf3
(For s390x architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.10.10-s390x
The image digest is sha256:49b63b22bc221e29e804fc3cc769c6eff97c655a1f5017f429aa0dad2593a0a8
(For ppc64le architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.10.10-ppc64le
The image digest is sha256:0d34e1198679a500a3af7acbdfba7864565f7c4f5367ca428d34dee9a9912c9c
(For aarch64 architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.10.10-aarch64
The image digest is sha256:ddf6cb04e74ac88874793a3c0538316c9ac8ff154267984c8a4ea7047913e1db
All OpenShift Container Platform 4.10 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available
at https://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html
Solution
For OpenShift Container Platform 4.10 see the following documentation,
which will be updated shortly for this release, for important instructions
on how to upgrade your cluster and fully apply this asynchronous errata
update:
https://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html
Details on how to access this content are available at
https://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html
Affected Products
- Red Hat OpenShift Container Platform 4.10 for RHEL 8 x86_64
- Red Hat OpenShift Container Platform for Power 4.10 for RHEL 8 ppc64le
- Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.10 for RHEL 8 s390x
- Red Hat OpenShift Container Platform for ARM 64 4.10 aarch64
Fixes
- BZ - 2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter
- BZ - 2050118 - 4.10: oVirt CSI driver should use the trusted CA bundle when cluster proxy is configured
- BZ - 2052414 - Start last run action should contain current user name in the started-by annotation of the PLR
- BZ - 2054404 - ip-reconcile job is failing consistently
- BZ - 2054767 - [ovn] Missing lr-policy-list and snat rules for egressip when new pods are added
- BZ - 2054808 - MetaLLB: Validation Webhook: BGPPeer hold time is allowed to be set to less than 3s
- BZ - 2055661 - migrate loadbalancers from amphora to ovn not working
- BZ - 2057881 - MetalLB: speaker metrics is not updated when deleting a service
- BZ - 2059347 - FSyncControllerDegraded latches True, even after fsync latency recovers on all members
- BZ - 2059945 - MetalLB: Move CI config files to metallb repo from dev-scripts repo
- BZ - 2060362 - Openshift registry starts to segfault after S3 storage configuration
- BZ - 2060586 - [4.10.z] [RFE] use /dev/ptp_hyperv on Azure/AzureStack
- BZ - 2064204 - Cachito request failure with vendor directory is out of sync with go.mod/go.sum
- BZ - 2064988 - Fix the hubUrl docs link in pipeline quicksearch modal
- BZ - 2065488 - ip-reconciler job does not complete, halts node drain
- BZ - 2065832 - oc mirror hangs when processing the Red Hat 4.10 catalog
- BZ - 2067311 - PPT event source is lost when received by the consumer
- BZ - 2067719 - Update channels information link is taking to a 404 error page
- BZ - 2069095 - cluster-autoscaler-default will fail when automated etcd defrag is running on large scale OpenShift Container Platform 4 - Cluster
- BZ - 2069913 - Disabling community tasks is not working
- BZ - 2070131 - Installation of Openshift virtualization fails with error service "hco-webhook-service" not found
- BZ - 2070492 - [4.10.z backport] On OCP 4.10+ using OVNK8s on BM IPI, nodes register as localhost.localdomain
- BZ - 2070525 - [OCPonRHV]- after few days that cluster is alive we got error in storage operator
- BZ - 2071479 - Thanos Querier high CPU and memory usage till OOM
- BZ - 2072191 - [4.10] cluster storage operator AWS credentialsrequest lacks KMS privileges
- BZ - 2072440 - Pipeline builder makes too many (100+) API calls upfront
- BZ - 2072928 - mapi_current_pending_csr is always set to 1 on OpenShift Container Platform
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.