[RHSA-2023:3342-01] Moderate: OpenShift Container Platform 4.13.4 CNF vRAN extras security update

Security announcements for all Red Hat products and services. rhsa-announce at redhat.com
Wed Jun 21 21:51:05 UTC 2023


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: OpenShift Container Platform 4.13.4 CNF vRAN extras security update
Advisory ID:       RHSA-2023:3342-01
Product:           Red Hat OpenShift Enterprise
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:3342
Issue date:        2023-06-21
CVE Names:         CVE-2020-16250 CVE-2022-36227 CVE-2023-0361 
                   CVE-2023-27535 
=====================================================================

1. Summary:

An update for ztp-site-generate-container, topology-aware-lifecycle-manager
and bare-metal-event-relay is now available for Red Hat OpenShift Container
Platform 4.13.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.

This advisory contains the extra low-latency container images for Red Hat
OpenShift Container Platform 4.13. See the following advisory for the
container images for this release:

https://access.redhat.com/errata/RHSA-2023:3614

All OpenShift Container Platform users are advised to upgrade to these
updated packages and images.

Security Fix(es):

* vault: Hashicorp Vault AWS IAM Integration Authentication Bypass
(CVE-2020-16250)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

4. Bugs fixed (https://bugzilla.redhat.com/):

2167337 - CVE-2020-16250 vault: Hashicorp Vault AWS IAM Integration Authentication Bypass

5. JIRA issues fixed (https://issues.redhat.com/):

OCPBUGS-13161 - SiteConfig disk partition definition fails when applied to multiple nodes in a cluster
OCPBUGS-13700 - Misleading backup conditions in CGU when all clusters are already compliant
OCPBUGS-7422 - Occasionally an entire CGU will fail to upgrade with BackupTimeout while upgrading many clusters at scale

6. References:

https://access.redhat.com/security/cve/CVE-2020-16250
https://access.redhat.com/security/cve/CVE-2022-36227
https://access.redhat.com/security/cve/CVE-2023-0361
https://access.redhat.com/security/cve/CVE-2023-27535
https://access.redhat.com/security/updates/classification/#moderate

7. Contact:

The Red Hat security contact is <secalert at redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBZJNwydzjgjWX9erEAQiMSA//RPERiURGU29ibKlvLcD2PhUJCFZA3Ts4
+XZSnUprsFOmyHucYw71YwenlQaLjKwSbZuowAtV19hxz25wausXJDoGIc5kl2Xt
0YNZL5XO114l8qbnyU59q1lnQhAz31JZ4xq80RlvwBcJKgJtrGfJSa/obks0OEjx
mPNY7doM6Wj5IwIli47G0E+ZMbCgObWCjEjHD11al4H16s69Aog8pAxFoYQVDKz+
KyEtOfSABifeIefyj0Zt6ROvBahs5HwH5KuzH76zfF9fwDXefLPcyN9jRQWLr2L6
5xzV5HIHxeUlOxoa/Dt5aIS4ZMpZE2t2St8kcMf9xnWKf1tSeksta1z/l2NuAPAu
bSejhqM/AdyviDqfP61xEYuZ/L4wz2RlQCOLlehj64nfce65wCmhPjvhBO0vXwLv
iKw3gy3s23sU/VulZFFmzNRRlP1Sed8QlOiY5/E3fT8tCvttNCxIJvyvDhS8kDBy
TE3Qt0to8gXC9ZnBRypZwr7AXNsJoAAZm6oBO4KjvdXSw64NNBS1hQ2Lyf7f2+t/
gRl1FEZSTDZXwk7M4x57m76G8jl6I9z8e9HF5S420vt96vae99Jq/NOrZlHY6OTI
otH0wX1z4iPu64Pe0yCOYHZxK3hppPscZ/j8s0WhmcF/Egv9L20t37DJQGm+PoPz
rGzrhNGpC/I=
=/wGh
-----END PGP SIGNATURE-----


More information about the RHSA-announce mailing list