Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2021:0637: Red Hat Security Advisory: OpenShift Container Platform 3.11.394 bug fix and security update

Red Hat OpenShift Container Platform release 3.11.394 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.Red Hat OpenShift Container Platform is Red Hat’s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Security Fix(es):

  • jenkins-2-plugins/subversion: XML parser is not preventing XML external entity (XXE) attacks (CVE-2020-2304)
  • jenkins-2-plugins/mercurial: XML parser is not preventing XML external entity (XXE) attacks (CVE-2020-2305)
  • ant: Insecure temporary file vulnerability (CVE-2020-1945)
  • jenkins-2-plugins/mercurial: Missing permission check in an HTTP endpoint could result in information disclosure (CVE-2020-2306)
  • jenkins-2-plugins/kubernetes: Jenkins controller environment variables are accessible in Kubernetes plug-in (CVE-2020-2307)
  • jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes Plugin allows listing pod templates (CVE-2020-2308)
  • jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes plug-in allows enumerating credentials IDs (CVE-2020-2309)
  • ant: Insecure temporary file (CVE-2020-11979)
  • python-rsa: Bleichenbacher timing oracle attack against RSA decryption (CVE-2020-25658) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 3.11.394. See the following advisory for the container images for this release: https://access.redhat.com/errata/RHBA-2021:0638 Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes: https://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html This update fixes the following bugs among others:
  • Previously, the restart-cluster playbook did not evaluate the defined cluster size for ops clusters. This was causing come clusters to never complete their restart. This bug fix passes the logging ops cluster size, allowing restarts of ops clusters to complete successfully. (BZ#1879407)
  • Previously, the openshift_named_certificates role checked the contents of the ca-bundle.crt file during cluster installation. This caused the check to fail during initial installation because the ca-bundle.crt file is not yet created in that scenario. This bug fix allows the cluster to skip checking the ca-bundle.crt file if it does not exist, resulting in initial installations succeeding. (BZ#1920567)
  • Previously, if the openshift_release attribute was not set in the Ansible inventory file, the nodes of the cluster would fail during an upgrade. This was caused by the cluster_facts.yml file being gathered before the openshift_release attribute was defined by the upgrade playbook. Now the cluster_facts.yml file is gathered after the openshift_version role runs and the openshift_release attribute is set, allowing for successful node upgrades. (BZ#1921353) All OpenShift Container Platform 3.11 users are advised to upgrade to these updated packages and images. Related CVEs:
  • CVE-2020-1945: ant: insecure temporary file vulnerability
  • CVE-2020-2304: jenkins-2-plugins/subversion: XML parser is not preventing XML external entity (XXE) attacks
  • CVE-2020-2305: jenkins-2-plugins/mercurial: XML parser is not preventing XML external entity (XXE) attacks
  • CVE-2020-2306: jenkins-2-plugins/mercurial: Missing permission check in an HTTP endpoint could result in information disclosure
  • CVE-2020-2307: jenkins-2-plugins/kubernetes: Jenkins controller environment variables are accessible in Kubernetes Plugin
  • CVE-2020-2308: jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes Plugin allows listing pod templates
  • CVE-2020-2309: jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes Plugin allows enumerating credentials IDs
  • CVE-2020-11979: ant: insecure temporary file
  • CVE-2020-25658: python-rsa: bleichenbacher timing oracle attack against RSA decryption
  • CVE-2021-21602: jenkins: Arbitrary file read vulnerability in workspace browsers
  • CVE-2021-21603: jenkins: XSS vulnerability in notification bar
  • CVE-2021-21604: jenkins: Improper handling of REST API XML deserialization errors
  • CVE-2021-21605: jenkins: Path traversal vulnerability in agent names
  • CVE-2021-21606: jenkins: Arbitrary file existence check in file fingerprints
  • CVE-2021-21607: jenkins: Excessive memory allocation in graph URLs leads to denial of service
  • CVE-2021-21608: jenkins: Stored XSS vulnerability in button labels
  • CVE-2021-21609: jenkins: Missing permission check for paths with specific prefix
  • CVE-2021-21610: jenkins: Reflected XSS vulnerability in markup formatter preview
  • CVE-2021-21611: jenkins: Stored XSS vulnerability on new item page
Red Hat Security Data
#xss#vulnerability#red_hat#dos#oracle#kubernetes#oracle

Red Hat Security Data: Latest News

RHSA-2023:5627: Red Hat Security Advisory: kernel security, bug fix, and enhancement update