RedHat: RHSA-2023-1158:01 Moderate: OpenShift Container Platform 4....
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: OpenShift Container Platform 4.11.31 bug fix and security update
Advisory ID:       RHSA-2023:1158-01
Product:           Red Hat OpenShift Enterprise
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:1158
Issue date:        2023-03-14
CVE Names:         CVE-2022-21698 CVE-2022-23521 CVE-2022-41903 
=====================================================================

1. Summary:

Red Hat OpenShift Container Platform release 4.11.31 is now available with
updates to packages and images that fix several bugs and add enhancements.

This release includes a security update for Red Hat OpenShift Container
Platform 4.11.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.

This advisory contains the container images for Red Hat OpenShift Container
Platform 4.11.31. See the following advisory for the RPM packages for this
release:

https://access.redhat.com/errata/RHBA-2023:1157

Space precludes documenting all of the container images in this advisory.
See the following Release Notes documentation, which will be updated
shortly for this release, for details about these changes:

https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html

Security Fix(es):

* prometheus/client_golang: Denial of service using
InstrumentHandlerCounter (CVE-2022-21698)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

All OpenShift Container Platform 4.11 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift CLI (oc)
or web console. Instructions for upgrading a cluster are available at
https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html

3. Solution:

For OpenShift Container Platform 4.11 see the following documentation,
which will be updated shortly for this release, for important instructions
on how to upgrade your cluster and fully apply this asynchronous errata
update:

https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html

You may download the oc tool and use it to inspect release image metadata
for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests
may be found at
https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.

The sha values for the release are

(For x86_64 architecture)
The image digest is
sha256:5fbe52f0f89d72e4d28b2a40dc69174fe10cce0a99dc5caa6fcfbf4226e08919

(For s390x architecture)
The image digest is
sha256:5bf0f916f8a2c22d33f1da578274c201217e1e978a99730f4416fe528d3804c0

(For ppc64le architecture)
The image digest is
sha256:cc10900ad98b44ba432bc0d99e7d4fffb5498fd6844fc3b6a0a3552ee6d64059

(For aarch64 architecture)
The image digest is
sha256:f91f7f747915f6e9dcc3c7dcaf1b8ef26d06c314c279f0fd6e65930d93598e62

All OpenShift Container Platform 4.11 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift CLI (oc)
or web console. Instructions for upgrading a cluster are available at
https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html

4. Bugs fixed (https://bugzilla.redhat.com/):

2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter

5. JIRA issues fixed (https://issues.jboss.org/):

OCPBUGS-2584 - python3-kubernetes is missing a dependency on python3-oauthlib and python3-requests-oauthlib
OCPBUGS-5954 - ip-reconciler removes the overlappingrangeipreservations whether the pod is alive or not [backport 4.11]
OCPBUGS-621 - [IBM Z]: Openshift-marketplace pods are in CrashLoopBackOff state
OCPBUGS-6993 - Hosted ovnkubernetes pods are not being spread among workers evenly
OCPBUGS-7727 - [4.11] Fix disaster recovery test [sig-etcd][Feature:DisasterRecovery][Disruptive] [Feature:EtcdRecovery] Cluster should restore itself after quorum loss [Serial]
OCPBUGS-7735 - [4.11] Afterburn fails on AWS/GCP clusters born in OCP 4.1/4.2
OCPBUGS-7950 - Repositories list does not show the running pipelinerun as last pipelinerun
OCPBUGS-7987 - Azure Disk volume is taking time to attach/detach

6. References:

https://access.redhat.com/security/cve/CVE-2022-21698
https://access.redhat.com/security/cve/CVE-2022-23521
https://access.redhat.com/security/cve/CVE-2022-41903
https://access.redhat.com/security/updates/classification/#moderate
https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html

7. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=hXvq
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2023-1158:01 Moderate: OpenShift Container Platform 4.11.31

Red Hat OpenShift Container Platform release 4.11.31 is now available with updates to packages and images that fix several bugs and add enhancements

Summary

Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.31. See the following advisory for the RPM packages for this release:
https://access.redhat.com/errata/RHBA-2023:1157
Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html
Security Fix(es):
* prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
All OpenShift Container Platform 4.11 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html

Solution

For OpenShift Container Platform 4.11 see the following documentation,which will be updated shortly for this release, for important instructionson how to upgrade your cluster and fully apply this asynchronous errataupdate:https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.htmlYou may download the oc tool and use it to inspect release image metadatafor x86_64, s390x, ppc64le, and aarch64 architectures. The image digestsmay be found athttps://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.The sha values for the release are(For x86_64 architecture)The image digest issha256:5fbe52f0f89d72e4d28b2a40dc69174fe10cce0a99dc5caa6fcfbf4226e08919(For s390x architecture)The image digest issha256:5bf0f916f8a2c22d33f1da578274c201217e1e978a99730f4416fe528d3804c0(For ppc64le architecture)The image digest issha256:cc10900ad98b44ba432bc0d99e7d4fffb5498fd6844fc3b6a0a3552ee6d64059(For aarch64 architecture)The image digest issha256:f91f7f747915f6e9dcc3c7dcaf1b8ef26d06c314c279f0fd6e65930d93598e62All OpenShift Container Platform 4.11 users are advised to upgrade to theseupdated packages and images when they are available in the appropriaterelease channel. To check for available updates, use the OpenShift CLI (oc)or web console. Instructions for upgrading a cluster are available athttps://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html

References

https://access.redhat.com/security/cve/CVE-2022-21698 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE-2022-41903 https://access.redhat.com/security/updates/classification/#moderate https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html

Package List


Severity
Advisory ID: RHSA-2023:1158-01
Product: Red Hat OpenShift Enterprise
Advisory URL: https://access.redhat.com/errata/RHSA-2023:1158
Issued Date: : 2023-03-14
CVE Names: CVE-2022-21698 CVE-2022-23521 CVE-2022-41903

Topic

Red Hat OpenShift Container Platform release 4.11.31 is now available withupdates to packages and images that fix several bugs and add enhancements.This release includes a security update for Red Hat OpenShift ContainerPlatform 4.11.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.

Relevant Releases Architectures

Bugs Fixed

2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter

5. JIRA issues fixed (https://issues.jboss.org/):

OCPBUGS-2584 - python3-kubernetes is missing a dependency on python3-oauthlib and python3-requests-oauthlib

OCPBUGS-5954 - ip-reconciler removes the overlappingrangeipreservations whether the pod is alive or not [backport 4.11]

OCPBUGS-621 - [IBM Z]: Openshift-marketplace pods are in CrashLoopBackOff state

OCPBUGS-6993 - Hosted ovnkubernetes pods are not being spread among workers evenly

OCPBUGS-7727 - [4.11] Fix disaster recovery test [sig-etcd][Feature:DisasterRecovery][Disruptive] [Feature:EtcdRecovery] Cluster should restore itself after quorum loss [Serial]

OCPBUGS-7735 - [4.11] Afterburn fails on AWS/GCP clusters born in OCP 4.1/4.2

OCPBUGS-7950 - Repositories list does not show the running pipelinerun as last pipelinerun

OCPBUGS-7987 - Azure Disk volume is taking time to attach/detach