Issued:
2024-06-27
Updated:
2024-06-27

RHSA-2024:0041 - Critical: OpenShift Container Platform 4.16.0 bug fix and security update


Synopsis

Critical: OpenShift Container Platform 4.16.0 bug fix and security update

Type/Severity

Security Advisory Critical

Topic

Red Hat OpenShift Container Platform release 4.16.0 is now available with updates to packages and images that fix several bugs and add enhancements.

This release includes a security update for Red Hat OpenShift Container Platform 4.16.

Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.

This advisory contains the container images for Red Hat OpenShift Container Platform 4.16.0. See the following advisory for the RPM packages for this release:

https://access.redhat.com/errata/RHSA-2024:0045

Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:

https://docs.openshift.com/container-platform/4.16/release_notes/ocp-4-16-release-notes.html

Security Fix(es):

  • webpack-dev-middleware: lack of URL validation may lead to file leak (CVE-2024-29180)
  • helm: shows secrets with --dry-run option in clear text (CVE-2019-25210)
  • opentelemetry: DoS vulnerability in otelhttp (CVE-2023-45142)
  • golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect (CVE-2023-45289)
  • opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics (CVE-2023-47108)
  • ssh: Prefix truncation attack on Binary Packet Protocol (BPP) (CVE-2023-48795)
  • coredns: CD bit response is cached and served later (CVE-2024-0874)
  • quic-go: memory exhaustion attack against QUIC's connection ID mechanism (CVE-2024-22189)
  • golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm (CVE-2024-24783)
  • golang: net/mail: comments in display names are incorrectly handled (CVE-2024-24784)
  • golang: html/template: errors returned from MarshalJSON methods may break template escaping (CVE-2024-24785)
  • golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)
  • cloudevents/sdk-go: usage of WithRoundTripper to create a Client leaks credentials (CVE-2024-28110)
  • jose: resource exhaustion (CVE-2024-28176)
  • jose-go: improper handling of highly compressed data (CVE-2024-28180)
  • follow-redirects: Possible credential leak (CVE-2024-28849)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

All OpenShift Container Platform 4.16 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.16/updating/updating_a_cluster/updating-cluster-cli.html

Solution

For OpenShift Container Platform 4.16 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:

https://docs.openshift.com/container-platform/4.16/release_notes/ocp-4-16-release-notes.html

You may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.

  The sha values for the release are

  (For x86_64 architecture)
  The image digest is sha256:3717338045df06e31effea46761b2c7e90f543cc4f00547af8158dd6aea868c3

  (For s390x architecture)
  The image digest is sha256:f02384fd3022a53fa24e142c3d8eb51547f566611a9dd560d5bfeabab1e578da

  (For ppc64le architecture)
  The image digest is sha256:500926479acad10193dbf6ea3944e23b92ff004bcf7bfb7e85728f1b8cffe2b2

  (For aarch64 architecture)
  The image digest is sha256:817126345d1ee68397634303571632c5cc8938cd4d59f940803ab38d8e6799e3

All OpenShift Container Platform 4.16 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.16/updating/updating_a_cluster/updating-cluster-cli.html

Affected Products

ProductVersionArch
Red Hat OpenShift Container Platform4.16x86_64
Red Hat OpenShift Container Platform for Power4.16ppc64le
Red Hat OpenShift Container Platform for IBM Z and LinuxONE4.16s390x
Red Hat OpenShift Container Platform for ARM 644.16aarch64

Fixes

CVEs

References


Additional information