-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: OpenShift Container Platform 4.11.40 security update
Advisory ID:       RHSA-2023:2695-01
Product:           Red Hat OpenShift Enterprise
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:2695
Issue date:        2023-05-18
CVE Names:         CVE-2022-3064 
====================================================================
1. Summary:

Red Hat OpenShift Container Platform release 4.11.40 is now available with
updates to packages and images that fix several bugs and add enhancements.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.

This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 4.11.40. See the following advisory for the container images for
this release:

Security Fix(es):

* go-yaml: Improve heuristics preventing CPU/memory abuse by parsing
malicious or large YAML documents (CVE-2022-3064)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

All OpenShift Container Platform 4.11 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift CLI (oc)
or web console. Instructions for upgrading a cluster are available at
https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html

3. Solution:

For OpenShift Container Platform 4.11 see the following documentation,
which will be updated shortly for this release, for important instructions
on how to upgrade your cluster and fully apply this asynchronous errata
update:

https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html

4. Bugs fixed (https://bugzilla.redhat.com/):

2163037 - CVE-2022-3064 go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents

5. JIRA issues fixed (https://issues.redhat.com/):

OCPBUGS-4603 - SR-IOV VFs may get reseted after being allocated by other pods 

6. References:

https://access.redhat.com/security/cve/CVE-2022-3064
https://access.redhat.com/security/updates/classification/#moderate

7. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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oBec
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2023-2695:01 Moderate: OpenShift Container Platform 4.11.40

Red Hat OpenShift Container Platform release 4.11.40 is now available with updates to packages and images that fix several bugs and add enhancements

Summary

Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.11.40. See the following advisory for the container images for this release:
Security Fix(es):
* go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents (CVE-2022-3064)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
All OpenShift Container Platform 4.11 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html



Summary


Solution

For OpenShift Container Platform 4.11 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html

References

https://access.redhat.com/security/cve/CVE-2022-3064 https://access.redhat.com/security/updates/classification/#moderate

Package List


Severity
Advisory ID: RHSA-2023:2695-01
Product: Red Hat OpenShift Enterprise
Advisory URL: https://access.redhat.com/errata/RHSA-2023:2695
Issued Date: : 2023-05-18
CVE Names: CVE-2022-3064

Topic

Red Hat OpenShift Container Platform release 4.11.40 is now available withupdates to packages and images that fix several bugs and add enhancements.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures


Bugs Fixed

2163037 - CVE-2022-3064 go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents

5. JIRA issues fixed (https://issues.redhat.com/):

OCPBUGS-4603 - SR-IOV VFs may get reseted after being allocated by other pods


Related News