-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: OpenShift Container Platform 4.9.59 security update Advisory ID: RHSA-2023:1525-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2023:1525 Issue date: 2023-04-05 CVE Names: CVE-2021-20329 CVE-2022-42889 CVE-2023-0286 CVE-2023-0767 ==================================================================== 1. Summary: Red Hat OpenShift Container Platform release 4.9.59 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.9.59. See the following advisory for the RPM packages for this release: https://access.redhat.com/errata/RHSA-2023:1524 Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes: https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html Security Fix(es): * mongo-go-driver: specific cstrings input may not be properly validated (CVE-2021-20329) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. All OpenShift Container Platform 4.9 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html 3. Solution: See the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html You can download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch architectures. The image digests can be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags. The sha values for the release are: (For x86_64 architecture) The image digest is sha256:b22d8c20d3f7fc0afb8654f5df4cfafa8230ad6fe58c0c48760c3f42a3aae5fd (For s390x architecture) The image digest is sha256:8f0821c7da21b63df30f99572621700c4a2bfb1cf7570761f03c4fecfacbe548 (For ppc64le architecture) The image digest is sha256:2629197b0a278178d0350a6fac60ce5f2ff9047a6bef6f6933d375a029f6ccb1 (For aarch64 architecture) The image digest is sha256:5d043b2f061c4b0909b87b0c3ba8995fa2e20cda290a807b0a30722a0e8b4ce7 All OpenShift Container Platform 4.9 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html 4. Bugs fixed (https://bugzilla.redhat.com/): 1971033 - CVE-2021-20329 mongo-go-driver: specific cstrings input may not be properly validated 5. JIRA issues fixed (https://issues.jboss.org/): OCPBUGS-7081 - Bump to kubernetes 1.22.17 6. References: https://access.redhat.com/security/cve/CVE-2021-20329 https://access.redhat.com/security/cve/CVE-2022-42889 https://access.redhat.com/security/cve/CVE-2023-0286 https://access.redhat.com/security/cve/CVE-2023-0767 https://access.redhat.com/security/updates/classification/#moderate https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html 7. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBZC6iYNzjgjWX9erEAQj9CA//TjeVwLqMCVYlw2dbwvOjufPVQYx8SVat 8nbR7aGMXpXRNyVNAmKc7aeIZbx5k6WSgFi0yiIjoHOAt4bcz2alE1EcHRhLwiwX F0snoAgwrBnxauu9dKo47LaWH71WaMP112YgB3g3fOXNyLqlAgzZb2re60VSPsZj 3BDmfw4/DKSy3UQL3mATQtNp1x+sVmFuDdSHx8CCqGmpJrVcdSohY10qqwt6WpXV 6IIXx2ekXW1A48iEd9Qfggl6mZrfwlE5+wLj/WqgYxpkaFtiygSbgTjaKZePXpeA cG037lm35xDiRP7pJazPLnIcae+D3ReIwiK/xWwyd0gJ+9PlfuN7MEp3lKU9QEqS 3ZZJ1ayLFMCgTmcQNRWIYTUb4K03zf904djLnDByeG0KbuyqM7b8Xh0NzMVUfZ2y prCtLZXvu40ic5zGf9/dXJNffwm/wAkgPRnWJlg5D1y+izL6tu78sgCvHbf+gE+z /nj7BFWz2YBAvQLFDMUw/M0VcIP951SUC/F1qOwSc40tjS+nipqLrGTLzBPkllq4 u/sQxxC80ZLEx/Ke4Pv3/PaXqZ+dTMSsGU6Fixrt45KzSAjG0n9aKFjXq/+VRaDY tMtX0S40lEfbQVnCNtQvGQ5iaeK+brjH73NQZuEu3cq6t8ZHCDglcK+diQGKGiVP f7Wyl3XrF30=xJYw -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce