Moderate: OpenShift Container Platform 3.11.343 security and bug fix update

Synopsis

Moderate: OpenShift Container Platform 3.11.343 security and bug fix update

Type/Severity

Security Advisory: Moderate

Topic

Red Hat OpenShift Container Platform release 3.11.343 is now available with
updates to packages and images that fix several bugs.

This release includes a security update for Kubernetes for Red Hat
OpenShift Container Platform 3.11.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.

Security Fix(es):

  • kubernetes: compromised node could escalate to cluster level privileges (CVE-2020-8559)
  • kubernetes: improper validation of URL redirection in the Kubernetes API server allows an attacker-controlled Kubelet to redirect API server requests from streaming endpoints (CVE-2018-1002102)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 3.11.343. See the following advisory for the container images for this release:

https://access.redhat.com/errata/RHBA-2020:5362

All OpenShift Container Platform 3.11 users are advised to upgrade to these
updated packages and images.

Solution

See the following documentation, which will be updated shortly for release
3.11.343, for important instructions on how to upgrade your cluster and fully
apply this asynchronous errata update:

https://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258.

Affected Products

  • Red Hat OpenShift Container Platform 3.11 x86_64
  • Red Hat OpenShift Container Platform for Power 3.11 ppc64le

Fixes

  • BZ - 1784602 - CVE-2018-1002102 kubernetes: improper validation of URL redirection in the Kubernetes API server allows an attacker-controlled Kubelet to redirect API server requests from streaming endpoints
  • BZ - 1851422 - CVE-2020-8559 kubernetes: compromised node could escalate to cluster level privileges
  • BZ - 1860906 - Setting for openshift_upgrade_nodes_label ignored during upgrade
  • BZ - 1880784 - [3.11] - If cafile is not defined in named certificates - components like web console, prometheus will not trust the masterPublicURL
  • BZ - 1895445 - [CRI-O] Pleg not healthy due to a unresponding crio when terminationGracePeriod is greater than the PLEG timeout
  • BZ - 1896696 - OCP Service missing endpoint annotation openstack.org/kuryr-lbaas-state: causing kuryr controller to constantly crash
  • BZ - 1898906 - When scaling replicas to zero, Octavia loadbalancer pool members are not updated accordingly
  • BZ - 1899609 - The conditional check 'inventory_hostname in groups['oo_masters']' failed.
  • BZ - 1903524 - [3.11] PV backed by FC lun is not being unmounted properly and this leads to IO errors / xfs corruption.

CVEs

References