Headline
RHSA-2021:0637: Red Hat Security Advisory: OpenShift Container Platform 3.11.394 bug fix and security update
Red Hat OpenShift Container Platform release 3.11.394 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.Red Hat OpenShift Container Platform is Red Hat’s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Security Fix(es):
- jenkins-2-plugins/subversion: XML parser is not preventing XML external entity (XXE) attacks (CVE-2020-2304)
- jenkins-2-plugins/mercurial: XML parser is not preventing XML external entity (XXE) attacks (CVE-2020-2305)
- ant: Insecure temporary file vulnerability (CVE-2020-1945)
- jenkins-2-plugins/mercurial: Missing permission check in an HTTP endpoint could result in information disclosure (CVE-2020-2306)
- jenkins-2-plugins/kubernetes: Jenkins controller environment variables are accessible in Kubernetes plug-in (CVE-2020-2307)
- jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes Plugin allows listing pod templates (CVE-2020-2308)
- jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes plug-in allows enumerating credentials IDs (CVE-2020-2309)
- ant: Insecure temporary file (CVE-2020-11979)
- python-rsa: Bleichenbacher timing oracle attack against RSA decryption (CVE-2020-25658) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 3.11.394. See the following advisory for the container images for this release: https://access.redhat.com/errata/RHBA-2021:0638 Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes: https://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html This update fixes the following bugs among others:
- Previously, the restart-cluster playbook did not evaluate the defined cluster size for ops clusters. This was causing come clusters to never complete their restart. This bug fix passes the logging ops cluster size, allowing restarts of ops clusters to complete successfully. (BZ#1879407)
- Previously, the
openshift_named_certificates
role checked the contents of theca-bundle.crt
file during cluster installation. This caused the check to fail during initial installation because theca-bundle.crt
file is not yet created in that scenario. This bug fix allows the cluster to skip checking theca-bundle.crt
file if it does not exist, resulting in initial installations succeeding. (BZ#1920567) - Previously, if the
openshift_release
attribute was not set in the Ansible inventory file, the nodes of the cluster would fail during an upgrade. This was caused by thecluster_facts.yml
file being gathered before theopenshift_release
attribute was defined by the upgrade playbook. Now thecluster_facts.yml
file is gathered after theopenshift_version
role runs and theopenshift_release
attribute is set, allowing for successful node upgrades. (BZ#1921353) All OpenShift Container Platform 3.11 users are advised to upgrade to these updated packages and images. Related CVEs: - CVE-2020-1945: ant: insecure temporary file vulnerability
- CVE-2020-2304: jenkins-2-plugins/subversion: XML parser is not preventing XML external entity (XXE) attacks
- CVE-2020-2305: jenkins-2-plugins/mercurial: XML parser is not preventing XML external entity (XXE) attacks
- CVE-2020-2306: jenkins-2-plugins/mercurial: Missing permission check in an HTTP endpoint could result in information disclosure
- CVE-2020-2307: jenkins-2-plugins/kubernetes: Jenkins controller environment variables are accessible in Kubernetes Plugin
- CVE-2020-2308: jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes Plugin allows listing pod templates
- CVE-2020-2309: jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes Plugin allows enumerating credentials IDs
- CVE-2020-11979: ant: insecure temporary file
- CVE-2020-25658: python-rsa: bleichenbacher timing oracle attack against RSA decryption
- CVE-2021-21602: jenkins: Arbitrary file read vulnerability in workspace browsers
- CVE-2021-21603: jenkins: XSS vulnerability in notification bar
- CVE-2021-21604: jenkins: Improper handling of REST API XML deserialization errors
- CVE-2021-21605: jenkins: Path traversal vulnerability in agent names
- CVE-2021-21606: jenkins: Arbitrary file existence check in file fingerprints
- CVE-2021-21607: jenkins: Excessive memory allocation in graph URLs leads to denial of service
- CVE-2021-21608: jenkins: Stored XSS vulnerability in button labels
- CVE-2021-21609: jenkins: Missing permission check for paths with specific prefix
- CVE-2021-21610: jenkins: Reflected XSS vulnerability in markup formatter preview
- CVE-2021-21611: jenkins: Stored XSS vulnerability on new item page