-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat OpenShift Data Foundation 4.13.1 security and bug fix update Advisory ID: RHSA-2023:4437-01 Product: Red Hat OpenShift Data Foundation Advisory URL: https://access.redhat.com/errata/RHSA-2023:4437 Issue date: 2023-08-02 CVE Names: CVE-2022-46663 CVE-2023-0464 CVE-2023-0465 CVE-2023-0466 CVE-2023-1255 CVE-2023-2650 CVE-2023-3089 CVE-2023-24329 ===================================================================== 1. Summary: Updated images that fix several bugs are now available for Red Hat OpenShift Data Foundation 4.13.1 on Red Hat Enterprise Linux 8 from Red Hat Container Registry. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Data Foundation. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Data Foundation provisions a multi-cloud data management service with an S3-compatible API. Security Fix(es): * openshift: OCP & FIPS mode (CVE-2023-3089) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fixes: * Previously, an empty screen was seen for the topology view of the external mode because in external mode, the nodes are not labelled with the OCS label and hence, the topology view did not show the nodes at the first level. With this fix, the topology view is disabled for the external mode clusters and as a result, the confusing empty screen is not displayed. (BZ#2213739) * Previously, in MultiCloud Object Gateway (MCG), there was a significant degradation in performance with read and write operations of small objects. The degradation was because the Remote Procedure Calls (RPC) between the MCG endpoint and the core that were required to be cached, missed the cache each time causing an RPC message between the endpoint and the core per each operation. With this fix, the lookup in cache is fixed so that the existing data is found and not queried at each operation. (BZ#2215976) * Previously, there were repeated crashes of the MultiCloud Object Gateway (MCG) Operator because the operator collided with the updates to the structure when it was trying to print a debug message regarding an internal structure in the MCG Operator. With this release, the print is fixed so that there are no collisions, thereby avoiding the repeated crashes of the MCG Operator. (BZ#2216401) All users of Red Hat OpenShift Data Foundation are advised to upgrade to these updated images, which provide these bug fixes. 3. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 4. Bugs fixed (https://bugzilla.redhat.com/): 2212085 - CVE-2023-3089 openshift: OCP & FIPS mode 2213456 - Set ??maxOpenShiftVersion to block OpenShift that didn't upgrade ODF version 2213739 - Disable topology view for external mode 2216401 - ]backport to 4.13.z] noobaa-operator pod shows multiple restarts 2218181 - [IBM Z/MDR]: With ACM 2.8 applying DRpolicy to subscription workload fails 2218316 - [DR][4.13] Pass-through CA certificates to Velero for k8s object protection to function 2218487 - [MDR][Fusion] PVC remain in pending state after successful failover 2224244 - [Major Incident] CVE-2023-3089 mcg-operator-container: openshift: OCP & FIPS mode [openshift-data-foundation-4] 5. References: https://access.redhat.com/security/cve/CVE-2022-46663 https://access.redhat.com/security/cve/CVE-2023-0464 https://access.redhat.com/security/cve/CVE-2023-0465 https://access.redhat.com/security/cve/CVE-2023-0466 https://access.redhat.com/security/cve/CVE-2023-1255 https://access.redhat.com/security/cve/CVE-2023-2650 https://access.redhat.com/security/cve/CVE-2023-3089 https://access.redhat.com/security/cve/CVE-2023-24329 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/security/vulnerabilities/RHSB-2023-001 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJkyrqWAAoJENzjgjWX9erE1NMQAIC4nnvj3A+HlcoMKUfQOJVp ewo1f8kXEXc1c7hJqoNzEgIVO3hBOBo/I0wXAUaeNFxSD9zgpuU543Nhj57tb33G vYfSMKqUn7x4YPlUQixMPUk0OnEfFuEQXYOXqrcCrbMgGtWyaJwR/BU6HFdYBODd cZ4TgJN4Nz/8Ci57E5n/C5csf14WGbh/QJY649C7K+nOLj1jNSoslCO4i9UyVoqo qcLPtvP8QSLoyJZLszUczsqgH9VdUEn7LUYsEyNLwkf81aYsxgCN/Uu3M9uRsD11 bqhTR+Idlo1/oVhydVsLcVo6bIxzBK0JDOuOMb1Y1W/wJ+v6mDkFQWe1ha2jitqY neAKrSqMdM0omKzRrdi3sI3FUADBBFujCsu0Xoe8/i/Tzrc6pEtPZj6nqu6GIwC2 AsBJJ0DhQBXIFtZ9cOY3Rh2X5V/p/C6XCRSQ55Fi7undYpItU2BkqA6ZauFLxBu1 7FWfFLZwiRvCeJ7XKh5GUUX94SxWVkBw2LDIxtgoZxwiCh5gbZBm/2dmco68eLjJ w5+dugELgwxytRloAOhvh58dA3XyKM093K615Eov/LqwSdosmyR2GYRJOXNdLxnZ XJh6R1kTc1ibsUnpPdanz5nEZcBhSlavDYtNv9JPtlS2xE07S+5RGj9g1WCiUY6D vtbX1UW5Ud77UW2QB75X =IJ+o -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce