Red Hat 9041 Published by

An OpenShift Container Platform 4.11.12 security update has been released.



RHSA-2022:7201-01: Important: OpenShift Container Platform 4.11.12 security update



=====================================================================
Red Hat Security Advisory

Synopsis: Important: OpenShift Container Platform 4.11.12 security update
Advisory ID: RHSA-2022:7201-01
Product: Red Hat OpenShift Enterprise
Advisory URL:   https://access.redhat.com/errata/RHSA-2022:7201
Issue date: 2022-11-02
CVE Names: CVE-2020-35525 CVE-2020-35527 CVE-2022-0494
CVE-2022-1353 CVE-2022-2509 CVE-2022-2588
CVE-2022-3515 CVE-2022-23816 CVE-2022-23825
CVE-2022-26945 CVE-2022-29900 CVE-2022-29901
CVE-2022-30321 CVE-2022-30322 CVE-2022-30323
CVE-2022-32742 CVE-2022-37434 CVE-2022-40674
CVE-2022-41974
=====================================================================

1. Summary:

Red Hat OpenShift Container Platform release 4.11.12 is now available with
updates to packages and images that fix several bugs and add enhancements.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.

This advisory contains the container images for Red Hat OpenShift Container
Platform 4.11.12. See the following advisory for the RPM packages for this
release:

  https://access.redhat.com/errata/RHBA-2022:7200

Space precludes documenting all of the container images in this advisory.
See the following Release Notes documentation, which will be updated
shortly for this release, for details about these changes:

  https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html

Security Fix(es):

* go-getter: command injection vulnerability (CVE-2022-26945)
* go-getter: unsafe download (issue 1 of 3) (CVE-2022-30321)
* go-getter: unsafe download (issue 2 of 3) (CVE-2022-30322)
* go-getter: unsafe download (issue 3 of 3) (CVE-2022-30323)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

You may download the oc tool and use it to inspect release image metadata
as follows:

(For x86_64 architecture)

$ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.11.12-x86_64

The image digest is
sha256:0ca14e0f692391970fc23f88188f2a21f35a5ba24fe2f3cb908fd79fa46458e6

(For s390x architecture)

$ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.11.12-s390x

The image digest is
sha256:7b9b21e35286e67473a0c4c28c84e3d806eb30364682a6b072b79109c2d22c6b

(For ppc64le architecture)

$ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.11.12-ppc64le

The image digest is
sha256:c61315b1257695b5f86d2782a70909227e004cd7cd30236c6f94a9e4ecf24ecb

(For aarch64 architecture)

$ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.11.12-aarch64

The image digest is
sha256:c70dc68aef64280d3cba9a056af29438943b30c260a7156893e1bae5c6c5ce3f

All OpenShift Container Platform 4.11 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
at
  https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html

3. Solution:

For OpenShift Container Platform 4.11 see the following documentation,
which will be updated shortly for this release, for important instructions
on how to upgrade your cluster and fully apply this asynchronous errata
update:

  https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html

Details on how to access this content are available at
  https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html

4. Bugs fixed (  https://bugzilla.redhat.com/):

2042826 - [SNO] the replicas of ingresscontroller/default is 2 on new installed SNO private cluster
2092839 - Downward API (annotations) is missing PCI information when using the tuning metaPlugin on SR-IOV Networks
2092918 - CVE-2022-30321 go-getter: unsafe download (issue 1 of 3)
2092923 - CVE-2022-30322 go-getter: unsafe download (issue 2 of 3)
2092925 - CVE-2022-30323 go-getter: unsafe download (issue 3 of 3)
2092928 - CVE-2022-26945 go-getter: command injection vulnerability
2099800 - Bump to kubernetes 1.24.6
2109487 - machine-controller is case sensitive which can lead to false/positive errors

5. JIRA issues fixed (  https://issues.jboss.org/):

OCPBUGS-1099 - Missing $SEARCH domain in /etc/resolve.conf for OCP v4.9.31 cluster
OCPBUGS-1346 - OpenStack UPI scripts do not create server group for Computes
OCPBUGS-1658 - Whereabouts should allow non default interfaces to Pod IP list [backport 4.11]
OCPBUGS-1713 - Kuryr-Controller Restarting on KuryrPort with missing pod
OCPBUGS-1955 - [4.11] Dual stack cluster fails on installation when multi-path routing entries exist
OCPBUGS-1972 - [IPI on Baremetal] ipv6 support issue in metal3-httpd
OCPBUGS-1984 - Install Helm chart form doesn't allow the user select a specific version
OCPBUGS-2011 - [4.11] ironic clear_job_queue and reset_idrac pending issues
OCPBUGS-2014 - CI: Backend unit tests fails because devfile registry was updated (mock response)
OCPBUGS-2042 - [2102088] 4.11 CatalogSourcesUnhealthy error in subscription When upgrading ptp-operator
OCPBUGS-2046 - Remove policy/v1beta1 in 4.11 and later
OCPBUGS-2050 - [release-4.11] DNS operator does not reconcile the openshift-dns namespace
OCPBUGS-2092 - Use floating tags in golang imagestream
OCPBUGS-2112 - [release-4.11] Address e2e failures due to pod security
OCPBUGS-2113 - [4.11] etcd and kube-apiserver pods get restarted due to failed liveness probes while deleting/re-creating pods on SNO
OCPBUGS-2140 - member loses rights after some other user login in openid / group sync
OCPBUGS-2293 - CVO skips reconciling the installed optional resources in the 4.11 to 4.12 upgrade
OCPBUGS-2320 - [release-4.11] Remove namespace and name from gathered DVO metrics
OCPBUGS-2451 - e2e tests: Installs Red Hat Integration - 3scale operator test is failing due to change of Operator name
OCPBUGS-2528 - dns-default pod missing "target.workload.openshift.io/management:" annotation
OCPBUGS-2606 - [release-4.11] go.mod should beworking with golang-1.17 and golang-1.18
OCPBUGS-2616 - e2e-gcp-builds is permafailing
OCPBUGS-2626 - Worker creation fails within provider networks (as primary and secondary)
OCPBUGS-2640 - prometheus-k8s-0 ends in CrashLoopBackOff with evel=error err="opening storage failed: /prometheus/chunks_head/000002: invalid magic number 0" on SNO after hard reboot tests
OCPBUGS-2658 - [4.11] VPA E2Es fail due to CSV name mismatch
OCPBUGS-2766 - 'oc login' should be robust in the face of gather failures
OCPBUGS-2780 - Import: Advanced option sentence is splited into two parts and headlines has no padding
OCPBUGS-449 - KubeDaemonSetRolloutStuck alert using incorrect metric in 4.9 and 4.10
OCPBUGS-526 - Prerelease report bug link should be updated to JIRA instead of Bugzilla
OCPBUGS-668 - Prefer local dns does not work expectedly on OCPv4.11
OCPBUGS-673 - crio occasionally fails to start during deployment
OCPBUGS-689 - [2112237] [ Cluster storage Operator 4.x(10/11) ] DefaultStorageClassController report fake message "No default StorageClass for this platform" on Alicloud, IBM
OCPBUGS-744 - [4.11] Spoke BMH stuck ?provisioning? after changing a BIOS attribute via the converged workflow
OCPBUGS-947 - [4.11] Rebase openshift/etcd 4.11 onto 3.5.5
OCPBUGS-955 - [2087981] PowerOnVM_Task is deprecated use PowerOnMultiVM_Task for DRS ClusterRecommendation

6. References:

  https://access.redhat.com/security/cve/CVE-2020-35525
  https://access.redhat.com/security/cve/CVE-2020-35527
  https://access.redhat.com/security/cve/CVE-2022-0494
  https://access.redhat.com/security/cve/CVE-2022-1353
  https://access.redhat.com/security/cve/CVE-2022-2509
  https://access.redhat.com/security/cve/CVE-2022-2588
  https://access.redhat.com/security/cve/CVE-2022-3515
  https://access.redhat.com/security/cve/CVE-2022-23816
  https://access.redhat.com/security/cve/CVE-2022-23825
  https://access.redhat.com/security/cve/CVE-2022-26945
  https://access.redhat.com/security/cve/CVE-2022-29900
  https://access.redhat.com/security/cve/CVE-2022-29901
  https://access.redhat.com/security/cve/CVE-2022-30321
  https://access.redhat.com/security/cve/CVE-2022-30322
  https://access.redhat.com/security/cve/CVE-2022-30323
  https://access.redhat.com/security/cve/CVE-2022-32742
  https://access.redhat.com/security/cve/CVE-2022-37434
  https://access.redhat.com/security/cve/CVE-2022-40674
  https://access.redhat.com/security/cve/CVE-2022-41974
  https://access.redhat.com/security/updates/classification/#important

7. Contact:

The Red Hat security contact is . More contact
details at   https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.