-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: OpenShift sandboxed containers 1.2.0 security update
Advisory ID:       RHSA-2022:0855-01
Product:           Red Hat OpenShift Enterprise
Advisory URL:      https://access.redhat.com/errata/RHSA-2022:0855
Issue date:        2022-03-14
CVE Names:         CVE-2021-36221 CVE-2021-44716 
====================================================================
1. Summary:

OpenShift sandboxed containers 1.2.0 is now available.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE links in the References section.

2. Description:

OpenShift sandboxed containers support for OpenShift Container Platform
provides users with built-in support for running Kata containers as an
additional, optional runtime.

This advisory contains an update for OpenShift sandboxed containers with
enhancements, security updates, and bug fixes.

Space precludes documenting all of the updates to OpenShift sandboxed
containers in this advisory. See the following Release Notes documentation,
which will be updated shortly for this release, for details about these
changes:

https://docs.openshift.com/container-platform/4.10/sandboxed_containers/sandboxed-containers-release-notes.html

Security Fixes:

* net/http: limit growth of header canonicalization cache (CVE-2021-44716)

* net/http/httputil: panic due to racy read of persistConn after handler
panic (CVE-2021-36221)

For more details about the security issues, including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
pages listed in the References section.

3. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

4. Bugs fixed (https://bugzilla.redhat.com/):

1995656 - CVE-2021-36221 golang: net/http/httputil: panic due to racy read of persistConn after handler panic
2030801 - CVE-2021-44716 golang: net/http: limit growth of header canonicalization cache

5. JIRA issues fixed (https://issues.jboss.org/):

KATA-1015 - 1.2: unused sourceImage field in KataConfig is confusing
KATA-1019 - 1.2: annotations state Operator is only supported on OCP 4.8
KATA-1027 - Newer kata-containers shimv2 (from kata-2.2.0 onwards) doesn't work with OCP.
KATA-1118 - Attempt to uninstall while installation is in progress blocks
KATA-1134 - Metrics doesn't work with the latest runtime cgroups improvements and simplifications
KATA-1183 - security warning when creating daemonset for kata-monitor
KATA-1184 - MachineConfigPool kata-oc is not removed with KataConfig CRD is deleted
KATA-1189 - pods for kata-monitor daemonset don't start: SCC issues
KATA-1190 - Operator not reconciling when node labels are changed
KATA-1195 - Error: CreateContainer failed: Permission denied (os error 13): unknown
KATA-1205 - openshift-sandboxed-containers-operator namespace not labelled for kata metrics
KATA-1219 - kata-monitor will forget about a kata pod if an error happens while retrieving the metrics
KATA-1222 - daemonset creation fails with reconciler error
KATA-1224 - wrong channels and default version in internal build
KATA-1225 - upgrade from 1.1.0 to 1.2.0 failed
KATA-1247 - kataconfig can't be applied due to syntax error 
KATA-1249 - use official pullspec for metrics daemonset as default in kataconfig CRD
KATA-1288 - changes to spec.kataMonitorImage are not reconciled
KATA-1334 - Unable to loop mount file based image inside Kata container
KATA-1340 - runtime installation shows no progress after creating kataconfig
KATA-1383 - fix RHSA-2022:0658 (cyrus-sasl) 
KATA-553 - Worker node is not being created when scaling up a cluster with the Kata operator installed
KATA-588 - kata 2.0: stop a container spam crio logs continously
KATA-817 - There are no logs coming from kata-containers agent

6. References:

https://access.redhat.com/security/cve/CVE-2021-36221
https://access.redhat.com/security/cve/CVE-2021-44716
https://access.redhat.com/security/updates/classification/#moderate

7. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBYjBXvtzjgjWX9erEAQjqww//RMCA4qDjnMLRInZJc/3rOsThXEsGG/v8
5ZRFWBfIy87MkhgiLR4MDdM2/EdOOhD27KBCZWC5mLvxM+y4GKRVR/nzYeYjf+L4
3bDg7Sx/e52yRpgMJ4Ld5EhmSwsREins6UlPlROr/O9UgDRaBBloENWCvaJr+iVN
o/uO5MjmHGrnBMixP8weVDAeC5fvBVtcNHXRiqcqIRf5XauFj2GwyOdfZR6KuzMr
H5M97bQa7bAYnDaeCSml+kjD3pSN/Eei+Ngj72x4kal+aQYf/lV1RCp6+BSZpTlG
v4UmGz1OJlrJspdeixwp6MQ9k+qthtpZcR1+oQwuTlfqWq7KtlX+hpv77KaGU0Nx
krqA5rmQJE1mNPQBcX1TbhlL+IayAAMUjG/U57k75Q8d9jFYsHtn7mCZtCcnjTei
7FxrH9cIJbzdC8Fg3FSsn0fg2ts3bVo8VFr6mLSTmnCTh0CoOkNi1VoUYmxOjnVE
Qan3wK+3F2ykVssUlGBnjSwP9FIxDILKBT5e+Ty+90v3PYx3H7wGY38AbgZrYMJP
SW0ha0Q+1TUcriLTgdJPHYctGWrWtINvCdZX7WuBwy1x90jz5hPz/whk31+8Ezz0
tWEyG6GBc2UxOZRBzQFVVqTZjxUUH961iGLLZEh/onvBWv9/XoFkZnlYRV4pm2EH
dtS2WFZnPsg=z3KT
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2022-0855:01 Moderate: OpenShift sandboxed containers 1.2.0

OpenShift sandboxed containers 1.2.0 is now available

Summary

OpenShift sandboxed containers support for OpenShift Container Platform provides users with built-in support for running Kata containers as an additional, optional runtime.
This advisory contains an update for OpenShift sandboxed containers with enhancements, security updates, and bug fixes.
Space precludes documenting all of the updates to OpenShift sandboxed containers in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/4.10/sandboxed_containers/sandboxed-containers-release-notes.html
Security Fixes:
* net/http: limit growth of header canonicalization cache (CVE-2021-44716)
* net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
For more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE pages listed in the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

References

https://access.redhat.com/security/cve/CVE-2021-36221 https://access.redhat.com/security/cve/CVE-2021-44716 https://access.redhat.com/security/updates/classification/#moderate

Package List


Severity
Advisory ID: RHSA-2022:0855-01
Product: Red Hat OpenShift Enterprise
Advisory URL: https://access.redhat.com/errata/RHSA-2022:0855
Issued Date: : 2022-03-14
CVE Names: CVE-2021-36221 CVE-2021-44716

Topic

OpenShift sandboxed containers 1.2.0 is now available.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE links in the References section.


Topic


 

Relevant Releases Architectures


Bugs Fixed

1995656 - CVE-2021-36221 golang: net/http/httputil: panic due to racy read of persistConn after handler panic

2030801 - CVE-2021-44716 golang: net/http: limit growth of header canonicalization cache

5. JIRA issues fixed (https://issues.jboss.org/):

KATA-1015 - 1.2: unused sourceImage field in KataConfig is confusing

KATA-1019 - 1.2: annotations state Operator is only supported on OCP 4.8

KATA-1027 - Newer kata-containers shimv2 (from kata-2.2.0 onwards) doesn't work with OCP.

KATA-1118 - Attempt to uninstall while installation is in progress blocks

KATA-1134 - Metrics doesn't work with the latest runtime cgroups improvements and simplifications

KATA-1183 - security warning when creating daemonset for kata-monitor

KATA-1184 - MachineConfigPool kata-oc is not removed with KataConfig CRD is deleted

KATA-1189 - pods for kata-monitor daemonset don't start: SCC issues

KATA-1190 - Operator not reconciling when node labels are changed

KATA-1195 - Error: CreateContainer failed: Permission denied (os error 13): unknown

KATA-1205 - openshift-sandboxed-containers-operator namespace not labelled for kata metrics

KATA-1219 - kata-monitor will forget about a kata pod if an error happens while retrieving the metrics

KATA-1222 - daemonset creation fails with reconciler error

KATA-1224 - wrong channels and default version in internal build

KATA-1225 - upgrade from 1.1.0 to 1.2.0 failed

KATA-1247 - kataconfig can't be applied due to syntax error

KATA-1249 - use official pullspec for metrics daemonset as default in kataconfig CRD

KATA-1288 - changes to spec.kataMonitorImage are not reconciled

KATA-1334 - Unable to loop mount file based image inside Kata container

KATA-1340 - runtime installation shows no progress after creating kataconfig

KATA-1383 - fix RHSA-2022:0658 (cyrus-sasl)

KATA-553 - Worker node is not being created when scaling up a cluster with the Kata operator installed

KATA-588 - kata 2.0: stop a container spam crio logs continously

KATA-817 - There are no logs coming from kata-containers agent


Related News