Headline
RHSA-2022:0577: Red Hat Security Advisory: Windows Container Support for Red Hat OpenShift 5.0.0 [security update]
The components for Windows Container Support for Red Hat OpenShift 5.0.0 are now available. This product release includes bug fixes and a moderate security update for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2020-28851: golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension
- CVE-2020-28852: golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag
- CVE-2021-3121: gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
- CVE-2021-29923: golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet
- CVE-2021-31525: golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header
- CVE-2021-33195: golang: net: lookup functions may return invalid host names
- CVE-2021-33197: golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty
- CVE-2021-33198: golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents
- CVE-2021-34558: golang: crypto/tls: certificate of wrong type is causing TLS client to panic
- CVE-2021-36221: golang: net/http/httputil: panic due to racy read of persistConn after handler panic
Issued:
2022-03-28
Updated:
2022-03-28
RHSA-2022:0577 - Security Advisory
- Overview
- Updated Packages
Synopsis
Moderate: Windows Container Support for Red Hat OpenShift 5.0.0 [security update]
Type/Severity
Security Advisory: Moderate
Topic
The components for Windows Container Support for Red Hat OpenShift 5.0.0 are now available. This product release includes bug fixes and a moderate security update for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Windows Container Support for Red Hat OpenShift allows you to deploy Windows container workloads running on Windows Server containers.
Security Fix(es):
- gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)
- golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)
- golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)
- golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
- golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)
- golang: net: lookup functions may return invalid host names (CVE-2021-33195)
- golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
- golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
- golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
- golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Products
- Red Hat OpenShift Container Platform 4.10 for RHEL 8 x86_64
Fixes
- BZ - 1913333 - CVE-2020-28851 golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension
- BZ - 1913338 - CVE-2020-28852 golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag
- BZ - 1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
- BZ - 1958341 - CVE-2021-31525 golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header
- BZ - 1983596 - CVE-2021-34558 golang: crypto/tls: certificate of wrong type is causing TLS client to panic
- BZ - 1989564 - CVE-2021-33195 golang: net: lookup functions may return invalid host names
- BZ - 1989570 - CVE-2021-33197 golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty
- BZ - 1989575 - CVE-2021-33198 golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents
- BZ - 1990573 - Username annotation error when byoh Windows have uppercase hostname
- BZ - 1992006 - CVE-2021-29923 golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet
- BZ - 1992841 - Deleting Machine Node object throws reconciliation error after WMCO restart
- BZ - 1994859 - Windows Containers on Windows Nodes get assigned the DNS Server IP “172.30.0.10”, which is wrong, if the default kubernetes subnet is not used
- BZ - 1995656 - CVE-2021-36221 golang: net/http/httputil: panic due to racy read of persistConn after handler panic
- BZ - 2000772 - WMCO fails to configure VMs with Powershell set as the default SSH shell
- BZ - 2001547 - BYOH Windows instance configured with DNS name got deconfigured immediately on UPI baremetal
- BZ - 2002961 - CSR reconciler report error constantly when BYOH CSR approved by other Approver
- BZ - 2005360 - BYOH Windows instance configured twice with DNS name
- BZ - 2008601 - WMCO ignores delete events for machines with invalid IP addresses
- BZ - 2015772 - Replacing private key reconcile 2 Windows nodes in parallel
- BZ - 2032048 - CSR approval failures caused by update conflicts
- WINC-747 - Windows Container Support for Red Hat OpenShift 5.0.0 release
CVEs
- CVE-2020-28851
- CVE-2020-28852
- CVE-2021-3121
- CVE-2021-3521
- CVE-2021-3712
- CVE-2021-29923
- CVE-2021-31525
- CVE-2021-33195
- CVE-2021-33197
- CVE-2021-33198
- CVE-2021-34558
- CVE-2021-36221
- CVE-2021-42574
- CVE-2022-24407
Red Hat OpenShift Container Platform 4.10 for RHEL 8
SRPM
x86_64
The Red Hat security contact is [email protected]. More contact details at https://access.redhat.com/security/team/contact/.