-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat OpenShift Data Foundation 4.12.5 security and bug fix update Advisory ID: RHSA-2023:4287-01 Product: Red Hat OpenShift Data Foundation Advisory URL: https://access.redhat.com/errata/RHSA-2023:4287 Issue date: 2023-07-26 CVE Names: CVE-2020-24736 CVE-2023-1667 CVE-2023-2283 CVE-2023-3089 CVE-2023-24329 CVE-2023-26604 ===================================================================== 1. Summary: Updated images that fix several bugs are now available for Red Hat OpenShift Data Foundation 4.12.5 on Red Hat Enterprise Linux 8 from Red Hat Container Registry. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Data Foundation provisions a multicloud data management service with an S3 compatible API. Security Fix(es): * openshift: OCP & FIPS mode (CVE-2023-3089) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Previously, OpenShift Data Foundation was not setting up the correct user interface (UI) plugin version in its generated `plugin-manifest.json` during the upgrades. This resulted in OpenShift Data Foundation not showing up the refresh pop-up because it could not detect the change in version. With this fix, the correct plugin version is set up to enable OpenShift Container Platform console to detect upgrades and trigger the refresh pop-up dialog box. As a result, a refresh pop-up shows up and when clicked, it loads the new UI content for the upgraded OpenShift Data Foundation. (BZ#2214575) * Previously, in MultiCloud Object Gateway (MCG), there was a significant degradation in performance with read and write operations of small objects. The degradation was because the Remote Procedure Calls (RPC) between the MCG endpoint and the core that were required to be cached missed the cache each time causing an RPC message between the endpoint and the core per each operation. With this fix, the lookup in cache is fixed so that the existing data is found and not queried at each operation. (BZ#2215978) * Previously, there were repeated crashes of the MultiCloud Object Gateway (MCG) Operator because the operator collided with the updates to the structure when it was trying to print a debug message regarding an internal structure in the MCG Operator. With this release, the print is fixed so that there are no collisions, thereby avoiding the repeated crashes fo MCG Operator. (BZ#2216402) All users of Red Hat OpenShift Data Foundation are advised to upgrade to these updated images, which provide these bug fixes. 3. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 4. Bugs fixed (https://bugzilla.redhat.com/): 2210475 - When collecting Must-gather logs shows /usr/bin/gather_ceph_resources: line 341: jq: command not found 2211592 - [ODF 4.12] [GSS] unknown parameter name "FORCE_OSD_REMOVAL" 2212085 - CVE-2023-3089 openshift: OCP & FIPS mode 2213452 - Set ??maxOpenShiftVersion to block OpenShift that didn't upgrade ODF version 2214575 - ODF dashboard crashes when OCP and ODF are upgraded 2216402 - [backport to 4.12.z] noobaa-operator pod shows multiple restarts 2224246 - [Major Incident] CVE-2023-3089 mcg-operator-container: openshift: OCP & FIPS mode [openshift-data-foundation-4.12] 5. References: https://access.redhat.com/security/cve/CVE-2020-24736 https://access.redhat.com/security/cve/CVE-2023-1667 https://access.redhat.com/security/cve/CVE-2023-2283 https://access.redhat.com/security/cve/CVE-2023-3089 https://access.redhat.com/security/cve/CVE-2023-24329 https://access.redhat.com/security/cve/CVE-2023-26604 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/security/vulnerabilities/RHSB-2023-001 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJkwX/OAAoJENzjgjWX9erEPf0P/2LN/vkUNrfSZD25KV1e4K44 8Sd2RBx6iUO4Yy+O+AwT4t1lwebJQe0ZR3KkIbRreUFW3vyjuNN58O2uRtr5qYxR CVRynMzVG2jPpCGHaJ7+vjAVfqFaOU0koxF+Dan+J8+bb6UNGeGciaDCUxKm0r8o Y4uv9CwBahVpFoa68X0ZRsym69MYJSlPKJFweUOqownJ1OfMIKf/4UPBoex6jkUF wNQtImiBTbAxHkS3IoLkI2u0ABVPxIa3Aqz9b1U4jSet3ESj4X4304smnSZFCMLM uB3QnP0HtngNqpVmd3bvS94G8zWmIDpwK7K+uA9fLNpSj4n3hkb2SFQdmNzdA2EB 1F5ZdfBBJEe7nTiz4UoSrEC6s71qlJwuJgf/8VXOEwwXE2T+M2MG2WnzI4TXuBDb BzwEfwOkNw7UA1E8SQYwcRDKvhEyy81OilFcpNIos/89zDv0ZY6Uwq70wKa9o2zn wtU80K6oH9UH3AOTpXah0ykTvrS8UHSBYzZfOWihp4eUtQQsVDtfdT0+aJuvGC+8 XHXAw3QfmZYhtoZG/MrU50LSyZ7m5jaVmJdLNSFLPA6WGUJzCeeZioAdwI7uMYpJ EYDQRcIfvZPhhLqWonNQPAe2fi4tuGSWvTAOZhX8zlOMHN2Li1b4D10uBq+y66cy 9FDStP1Y8zQu3lR3UPBF =UROy -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce