Issued:
2017-12-07
Updated:
2017-12-07

RHSA-2017:3389 - Moderate: Red Hat OpenShift Enterprise security, bug fix, and enhancement update


Synopsis

Moderate: Red Hat OpenShift Enterprise security, bug fix, and enhancement update

Type/Severity

Security Advisory Moderate

Topic

An update is now available for Red Hat OpenShift Container Platform 3.4, Red Hat OpenShift Container Platform 3.5, and Red Hat OpenShift Container Platform 3.6.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

OpenShift Enterprise by Red Hat is the company's cloud computing Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud deployments.

This advisory contains the RPM packages for this release. An advisory for the container images for this release is available at: https://access.redhat.com/errata/RHBA-2017:3390.

Space precludes documenting all of the bug fixes and enhancements in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:

This page is not included, but the link has been rewritten to point to the nearest parent document.https://docs.openshift.com/container-platform/3.6/release_notes/ocp_3_6_release_notes.html

This page is not included, but the link has been rewritten to point to the nearest parent document.https://docs.openshift.com/container-platform/3.5/release_notes/ocp_3_5_release_notes.html

This page is not included, but the link has been rewritten to point to the nearest parent document.https://docs.openshift.com/container-platform/3.4/release_notes/ocp_3_4_release_notes.html

All OpenShift Container Platform 3 users are advised to upgrade to these updated packages and images.

Security Fix(es):

  • An attacker with knowledge of the given name used to authenticate and access Elasticsearch can later access it without the token, bypassing authentication. This attack also requires that the Elasticsearch be configured with an external route, and the data accessed is limited to the indices. (CVE-2017-12195)

This issue was discovered by Rich Megginson (Red Hat).

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

ProductVersionArch
Red Hat OpenShift Container Platform3.6x86_64
Red Hat OpenShift Container Platform3.5x86_64
Red Hat OpenShift Container Platform3.4x86_64

Updated Packages

  • atomic-openshift-master-3.6.173.0.63-1.git.0.855ea8b.el7.x86_64.rpm
  • atomic-openshift-docker-excluder-3.6.173.0.63-1.git.0.855ea8b.el7.noarch.rpm
  • atomic-openshift-node-3.5.5.31.47-1.git.0.25d535c.el7.x86_64.rpm
  • atomic-openshift-pod-3.5.5.31.47-1.git.0.25d535c.el7.x86_64.rpm
  • cockpit-kubernetes-155-1.el7.x86_64.rpm
  • atomic-openshift-3.6.173.0.63-1.git.0.855ea8b.el7.x86_64.rpm
  • atomic-openshift-federation-services-3.6.173.0.63-1.git.0.855ea8b.el7.x86_64.rpm
  • tuned-profiles-atomic-openshift-node-3.5.5.31.47-1.git.0.25d535c.el7.x86_64.rpm
  • openshift-elasticsearch-plugin-2.4.1.11__redhat_1-3.el7.src.rpm
  • atomic-openshift-sdn-ovs-3.5.5.31.47-1.git.0.25d535c.el7.x86_64.rpm
  • atomic-openshift-docker-excluder-3.5.5.31.47-1.git.0.25d535c.el7.noarch.rpm
  • atomic-openshift-dockerregistry-3.6.173.0.63-1.git.0.855ea8b.el7.x86_64.rpm
  • atomic-openshift-sdn-ovs-3.4.1.44.38-1.git.0.d04b8d5.el7.x86_64.rpm
  • tuned-profiles-atomic-openshift-node-3.4.1.44.38-1.git.0.d04b8d5.el7.x86_64.rpm
  • atomic-openshift-master-3.5.5.31.47-1.git.0.25d535c.el7.x86_64.rpm
  • atomic-openshift-clients-redistributable-3.5.5.31.47-1.git.0.25d535c.el7.x86_64.rpm
  • atomic-openshift-clients-3.5.5.31.47-1.git.0.25d535c.el7.x86_64.rpm
  • atomic-openshift-tests-3.5.5.31.47-1.git.0.25d535c.el7.x86_64.rpm
  • cockpit-debuginfo-155-1.el7.x86_64.rpm
  • openshift-elasticsearch-plugin-2.4.4.17__redhat_1-3.el7.src.rpm
  • tuned-profiles-atomic-openshift-node-3.6.173.0.63-1.git.0.855ea8b.el7.x86_64.rpm
  • atomic-openshift-clients-redistributable-3.6.173.0.63-1.git.0.855ea8b.el7.x86_64.rpm
  • atomic-openshift-3.4.1.44.38-1.git.0.d04b8d5.el7.src.rpm
  • atomic-openshift-excluder-3.6.173.0.63-1.git.0.855ea8b.el7.noarch.rpm
  • atomic-openshift-dockerregistry-3.4.1.44.38-1.git.0.d04b8d5.el7.x86_64.rpm
  • atomic-openshift-3.4.1.44.38-1.git.0.d04b8d5.el7.x86_64.rpm
  • cockpit-155-1.el7.src.rpm
  • atomic-openshift-3.5.5.31.47-1.git.0.25d535c.el7.src.rpm
  • atomic-openshift-dockerregistry-3.5.5.31.47-1.git.0.25d535c.el7.x86_64.rpm
  • atomic-openshift-node-3.4.1.44.38-1.git.0.d04b8d5.el7.x86_64.rpm
  • atomic-openshift-3.6.173.0.63-1.git.0.855ea8b.el7.src.rpm
  • atomic-openshift-pod-3.4.1.44.38-1.git.0.d04b8d5.el7.x86_64.rpm
  • atomic-openshift-clients-redistributable-3.4.1.44.38-1.git.0.d04b8d5.el7.x86_64.rpm
  • atomic-openshift-pod-3.6.173.0.63-1.git.0.855ea8b.el7.x86_64.rpm
  • atomic-openshift-sdn-ovs-3.6.173.0.63-1.git.0.855ea8b.el7.x86_64.rpm
  • atomic-openshift-clients-3.6.173.0.63-1.git.0.855ea8b.el7.x86_64.rpm
  • atomic-openshift-master-3.4.1.44.38-1.git.0.d04b8d5.el7.x86_64.rpm
  • atomic-openshift-service-catalog-3.6.173.0.63-1.git.0.855ea8b.el7.x86_64.rpm
  • atomic-openshift-cluster-capacity-3.6.173.0.63-1.git.0.855ea8b.el7.x86_64.rpm
  • atomic-openshift-node-3.6.173.0.63-1.git.0.855ea8b.el7.x86_64.rpm
  • openshift-elasticsearch-plugin-2.4.1.11__redhat_1-3.el7.noarch.rpm
  • atomic-openshift-3.5.5.31.47-1.git.0.25d535c.el7.x86_64.rpm
  • atomic-openshift-excluder-3.5.5.31.47-1.git.0.25d535c.el7.noarch.rpm
  • openshift-elasticsearch-plugin-2.4.4.17__redhat_1-3.el7.noarch.rpm
  • atomic-openshift-excluder-3.4.1.44.38-1.git.0.d04b8d5.el7.noarch.rpm
  • atomic-openshift-clients-3.4.1.44.38-1.git.0.d04b8d5.el7.x86_64.rpm
  • atomic-openshift-tests-3.4.1.44.38-1.git.0.d04b8d5.el7.x86_64.rpm
  • atomic-openshift-docker-excluder-3.4.1.44.38-1.git.0.d04b8d5.el7.noarch.rpm
  • atomic-openshift-tests-3.6.173.0.63-1.git.0.855ea8b.el7.x86_64.rpm

Fixes

CVEs

References


Additional information