RedHat: RHSA-2020-2479:01 Moderate: OpenShift Container Platform 3.11
Summary
OpenShift Enterprise by Red Hat is the company's cloud computing
Platform-as-a-Service (PaaS) solution designed for on-premise or private
cloud deployments.
Security Fix(es):
* libseccomp-golang: mishandling of multiple argument rules leading to a
bypass of intended access restrictions (CVE-2017-18367)
* kubernetes: Denial of service in API server via crafted YAML payloads by
authorized users (CVE-2019-11254)
* kubernetes: Server side request forgery (SSRF) in kube-controller-manager
allows users to leak secret information (CVE-2020-8555)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Summary
Solution
See the following documentation, which will be updated shortly for release
3.11.232, for important instructions on how to upgrade your cluster and
fully
apply this asynchronous errata update:
https://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html
This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258.
References
https://access.redhat.com/security/cve/CVE-2017-18367 https://access.redhat.com/security/cve/CVE-2019-11254 https://access.redhat.com/security/cve/CVE-2020-8555 https://access.redhat.com/security/updates/classification/#moderate
Package List
Red Hat OpenShift Container Platform 3.11:
Source:
atomic-openshift-3.11.232-1.git.0.a5bc32f.el7.src.rpm
noarch:
atomic-openshift-docker-excluder-3.11.232-1.git.0.a5bc32f.el7.noarch.rpm
atomic-openshift-excluder-3.11.232-1.git.0.a5bc32f.el7.noarch.rpm
ppc64le:
atomic-openshift-3.11.232-1.git.0.a5bc32f.el7.ppc64le.rpm
atomic-openshift-clients-3.11.232-1.git.0.a5bc32f.el7.ppc64le.rpm
atomic-openshift-hyperkube-3.11.232-1.git.0.a5bc32f.el7.ppc64le.rpm
atomic-openshift-hypershift-3.11.232-1.git.0.a5bc32f.el7.ppc64le.rpm
atomic-openshift-master-3.11.232-1.git.0.a5bc32f.el7.ppc64le.rpm
atomic-openshift-node-3.11.232-1.git.0.a5bc32f.el7.ppc64le.rpm
atomic-openshift-pod-3.11.232-1.git.0.a5bc32f.el7.ppc64le.rpm
atomic-openshift-sdn-ovs-3.11.232-1.git.0.a5bc32f.el7.ppc64le.rpm
atomic-openshift-template-service-broker-3.11.232-1.git.0.a5bc32f.el7.ppc64le.rpm
atomic-openshift-tests-3.11.232-1.git.0.a5bc32f.el7.ppc64le.rpm
x86_64:
atomic-openshift-3.11.232-1.git.0.a5bc32f.el7.x86_64.rpm
atomic-openshift-clients-3.11.232-1.git.0.a5bc32f.el7.x86_64.rpm
atomic-openshift-clients-redistributable-3.11.232-1.git.0.a5bc32f.el7.x86_64.rpm
atomic-openshift-hyperkube-3.11.232-1.git.0.a5bc32f.el7.x86_64.rpm
atomic-openshift-hypershift-3.11.232-1.git.0.a5bc32f.el7.x86_64.rpm
atomic-openshift-master-3.11.232-1.git.0.a5bc32f.el7.x86_64.rpm
atomic-openshift-node-3.11.232-1.git.0.a5bc32f.el7.x86_64.rpm
atomic-openshift-pod-3.11.232-1.git.0.a5bc32f.el7.x86_64.rpm
atomic-openshift-sdn-ovs-3.11.232-1.git.0.a5bc32f.el7.x86_64.rpm
atomic-openshift-template-service-broker-3.11.232-1.git.0.a5bc32f.el7.x86_64.rpm
atomic-openshift-tests-3.11.232-1.git.0.a5bc32f.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
Topic
An update for atomic-openshift is now available for Red Hat OpenShiftContainer Platform 3.11.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.
Topic
Relevant Releases Architectures
Red Hat OpenShift Container Platform 3.11 - noarch, ppc64le, x86_64
Bugs Fixed
1706826 - CVE-2017-18367 libseccomp-golang: mishandling of multiple argument rules leading to a bypass of intended access restrictions
1819486 - CVE-2019-11254 kubernetes: Denial of service in API server via crafted YAML payloads by authorized users1821583 - CVE-2020-8555 kubernetes: Server side request forgery (SSRF) in kube-controller-manager allows users to leak secret information