Red Hat 9062 Published by

An OpenShift Container Platform 4.7.28 security update has been released.



RHSA-2021:3262-01: Important: OpenShift Container Platform 4.7.28 security update



=====================================================================
Red Hat Security Advisory

Synopsis: Important: OpenShift Container Platform 4.7.28 security update
Advisory ID: RHSA-2021:3262-01
Product: Red Hat OpenShift Enterprise
Advisory URL:   https://access.redhat.com/errata/RHSA-2021:3262
Issue date: 2021-09-01
CVE Names: CVE-2021-3121 CVE-2021-3609 CVE-2021-22543
CVE-2021-22555 CVE-2021-27218
=====================================================================

1. Summary:

Red Hat OpenShift Container Platform release 4.7.28 is now available with
updates to packages and images that fix several bugs and add enhancements.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.

This advisory contains the container images for Red Hat OpenShift Container
Platform 4.7.28. See the following advisory for the RPM packages for this
release:

  https://access.redhat.com/errata/RHBA-2021:3263

Space precludes documenting all of the container images in this advisory.
See the following Release Notes documentation for details about these
changes:

  https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel
ease-notes.html

Security Fix(es):

* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index
validation (CVE-2021-3121)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fix(es):

* Machine Config Operator degrades during cluster update with failed to
convert Ignition config spec v2 to v3 (BZ#1956462)

* OCP IPI Publish Internal - GCP: Load Balancer service with External
Traffic Policy as Local is not working (BZ#1971669)

* [4.7] Unable to attach Vsphere volume shows the error "failed to get
canonical path" (BZ#1973766)

* oc logs doesn't work with piepeline builds (BZ#1974264)

* "provisioned registration errors" cannot be reported (BZ#1976924)

* AWS Elastic IP permissions are incorrectly required (BZ#1981553)

* Memory consumption (container_memory_rss) steadily growing for
/system.slice/kubelet.service when FIPS enabled [ocp 4.7] (BZ#1981580)

* Problematic Deployment creates infinite number Replicasets causing etcd
to reach quota limit (BZ#1981775)

* Size of the hostname was preventing proper DNS resolution of the worker
node names (BZ#1983695)

* (release-4.7) Insights status card shows nothing when 0 issues found
(BZ#1986724)

* drop-icmp pod blocks direct SSH access to cluster nodes (BZ#1988426)

* Editing a Deployment drops annotations (BZ#1989642)

* [Kuryr][4.7] Duplicated egress rule for service network in knp object
(BZ#1990175)

* Update failed - ovn-nbctl: duplicate nexthop for the same ECMP route
(BZ#1991445)

* Unable to install a zVM hosted OCP 4.7.24 on Z Cluster based on new RHCOS
47 RHEL 8.4 based build (BZ#1992240)

* alerts: SystemMemoryExceedsReservation triggers too quickly (BZ#1992687)

* failed to start cri-o service due to /usr/libexec/crio/conmon is missing
(BZ#1993386)

* Thanos build failure: vendor/ ignored (BZ#1994123)

* Ipv6 IP addresses are not accepted for whitelisting (BZ#1994645)

* upgrade from 4.6 to 4.7 to 4.8 with mcp worker "paused=true", crio
report "panic: close of closed channel" which lead to a master Node go into
Restart loop (BZ#1994729)

* linuxptp-daemon crash on 4.8 (BZ#1995579)

* long living clusters may fail to upgrade because of an invalid conmon
path (BZ#1995810)

For more details about the security issue(s), refer to the CVE
page(s) listed in the References section.

You may download the oc tool and use it to inspect release image metadata
as follows:

(For x86_64 architecture)

$ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.7.28-x86_64

The image digest is
sha256:b3f38d58057a12b0477bf28971390db3e3391ce1af8ac06e35d0aa9e8d8e5966

(For s390x architecture)

$ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.7.28-s390x

The image digest is
sha256:30c2011f6d84b16960b981a07558f96a55e59a281449d25c5ccc778aaeb2f970

(For ppc64le architecture)

$ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.7.28-ppc64le

The image digest is
sha256:52ebf0db5a36434357c24a64863025730d2159a94997333f15fbe1444fa88f4f

Instructions for upgrading a cluster are available
at
  https://docs.openshift.com/container-platform/4.7/updating/updating-cluster
- -between-minor.html#understanding-upgrade-channels_updating-cluster-between
- -minor

3. Solution:

For OpenShift Container Platform 4.7 see the following documentation, which
will be updated shortly for this release, for important instructions on how
to upgrade your cluster and fully apply this asynchronous errata update:

  https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel
ease-notes.html

Details on how to access this content are available at
  https://docs.openshift.com/container-platform/4.7/updating/updating-cluster
- -cli.html

4. Bugs fixed (  https://bugzilla.redhat.com/):

1863446 - [Assisted-4.5-M2] clean all does not remove ConfigMaps and PVC
1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
1956462 - Machine Config Operator degrades during cluster update with failed to convert Ignition config spec v2 to v3
1971669 - OCP IPI Publish Internal - GCP: Load Balancer service with External Traffic Policy as Local is not working
1973766 - [4.7] Unable to attach Vsphere volume shows the error "failed to get canonical path"
1974264 - oc logs doesn't work with piepeline builds
1976924 - "provisioned registration errors" cannot be reported
1981553 - AWS Elastic IP permissions are incorrectly required
1981775 - Problematic Deployment creates infinite number Replicasets causing etcd to reach quota limit
1983695 - Size of the hostname was preventing proper DNS resolution of the worker node names
1986724 - (release-4.7) Insights status card shows nothing when 0 issues found
1988426 - drop-icmp pod blocks direct SSH access to cluster nodes
1989642 - Editing a Deployment drops annotations
1990175 - [Kuryr][4.7] Duplicated egress rule for service network in knp object
1991445 - Update failed - ovn-nbctl: duplicate nexthop for the same ECMP route
1992240 - Unable to install a zVM hosted OCP 4.7.24 on Z Cluster based on new RHCOS 47 RHEL 8.4 based build
1992687 - alerts: SystemMemoryExceedsReservation triggers too quickly
1993386 - failed to start cri-o service due to /usr/libexec/crio/conmon is missing
1994123 - Thanos build failure: vendor/ ignored
1994645 - Ipv6 IP addresses are not accepted for whitelisting
1994729 - upgrade from 4.6 to 4.7 to 4.8 with mcp worker "paused=true", crio report "panic: close of closed channel" which lead to a master Node go into Restart loop
1995810 - long living clusters may fail to upgrade because of an invalid conmon path
1998112 - Networking issue with vSphere clusters running HW14 and later

5. References:

  https://access.redhat.com/security/cve/CVE-2021-3121
  https://access.redhat.com/security/cve/CVE-2021-3609
  https://access.redhat.com/security/cve/CVE-2021-22543
  https://access.redhat.com/security/cve/CVE-2021-22555
  https://access.redhat.com/security/cve/CVE-2021-27218
  https://access.redhat.com/security/updates/classification/#important

6. Contact:

The Red Hat security contact is . More contact
details at   https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.