- Issued:
- 2022-04-13
- Updated:
- 2022-04-13
RHSA-2022:1361 - Security Advisory
Synopsis
Important: Red Hat OpenShift Data Foundation 4.10.0 RPM security,enhancement&bugfix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated images that include numerous enhancements, security, and bug fixes
are now available for Red Hat OpenShift Data Foundation 4.10.0 on Red Hat
Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Description
Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Data Foundation provisions a multicloud data management service with an S3 compatible API.
Security Fix(es):
- golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)
- golang: syscall: don't close fd 0 on ForkExec error (CVE-2021-44717)
- golang: net/http: limit growth of header canonicalization cache (CVE-2021-44716)
- golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
Bug Fix(es):
These updated packages include numerous enhancements and bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat OpenShift Data Foundation Release Notes for information on the most significant of these changes:
All Red Hat OpenShift Data Foundation users are advised to upgrade to these updated packages, which provide numerous bug fixes and enhancements.
or more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information refer to the CVE
page(s) listed in the References section.
Affected Products
- Red Hat OpenShift Data Foundation 4 for RHEL 8 x86_64
- Red Hat OpenShift Data Foundation for IBM Power, little endian 4 for RHEL 8 ppc64le
- Red Hat OpenShift Data Foundation for IBM Z and LinuxONE 4 for RHEL 8 s390x
Fixes
- BZ - 1995656 - CVE-2021-36221 golang: net/http/httputil: panic due to racy read of persistConn after handler panic
- BZ - 2026342 - Noobaa diagnose command is not working properly in must-gather
- BZ - 2030787 - CVE-2021-43565 golang.org/x/crypto: empty plaintext packet causes panic
- BZ - 2030801 - CVE-2021-44716 golang: net/http: limit growth of header canonicalization cache
- BZ - 2030806 - CVE-2021-44717 golang: syscall: don't close fd 0 on ForkExec error
Red Hat OpenShift Data Foundation 4 for RHEL 8
SRPM | |
---|---|
mcg-5.10.0-72.el8.src.rpm | SHA-256: 6f43c5930e141674b18c404d06680cb4f173b7cc23d31d01976386fd374930ac |
x86_64 | |
mcg-5.10.0-72.el8.x86_64.rpm | SHA-256: 9cbb1b1279d921a1d0cf62dc383c204c0721eed3ed6d297156fb37e516640ee1 |
mcg-redistributable-5.10.0-72.el8.x86_64.rpm | SHA-256: b764cce09d0aca8996e100dccba3a543ba35e51749b6ac4171bde316488ebe5b |
Red Hat OpenShift Data Foundation for IBM Power, little endian 4 for RHEL 8
SRPM | |
---|---|
mcg-5.10.0-72.el8.src.rpm | SHA-256: 6f43c5930e141674b18c404d06680cb4f173b7cc23d31d01976386fd374930ac |
ppc64le | |
mcg-5.10.0-72.el8.ppc64le.rpm | SHA-256: 8735a2e59ee5d6139694bf226fcb0de82d01a4d3fc8d930e677c73868634fb6b |
Red Hat OpenShift Data Foundation for IBM Z and LinuxONE 4 for RHEL 8
SRPM | |
---|---|
mcg-5.10.0-72.el8.src.rpm | SHA-256: 6f43c5930e141674b18c404d06680cb4f173b7cc23d31d01976386fd374930ac |
s390x | |
mcg-5.10.0-72.el8.s390x.rpm | SHA-256: 7866d3b688941b45731ae6feb30633e4324aa166e8ff313531df36c44d3d88a7 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.