Important: OpenShift Container Platform 4.14.7 bug fix and security update

Related Vulnerabilities: CVE-2023-39325   CVE-2023-45142   CVE-2023-47108  

Synopsis

Important: OpenShift Container Platform 4.14.7 bug fix and security update

Type/Severity

Security Advisory: Important

Topic

Red Hat OpenShift Container Platform release 4.14.7 is now available with updates to packages and images that fix several bugs and add enhancements.

This release includes a security update for Red Hat OpenShift Container Platform 4.14.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.

This advisory contains the container images for Red Hat OpenShift Container Platform 4.14.7. See the following advisory for the RPM packages for this release:

https://access.redhat.com/errata/RHBA-2023:7834

Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:

https://docs.openshift.com/container-platform/4.14/release_notes/ocp-4-14-release-notes.html

Security Fix(es):

  • golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-39325)

A Red Hat Security Bulletin which addresses further details about the Rapid Reset flaw is available in the References section.

  • opentelemetry: DoS vulnerability in otelhttp (CVE-2023-45142)
  • opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics (CVE-2023-47108)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

All OpenShift Container Platform 4.14 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.14/updating/updating_a_cluster/updating-cluster-cli.html

Solution

For OpenShift Container Platform 4.14 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:

https://docs.openshift.com/container-platform/4.14/release_notes/ocp-4-14-release-notes.html

You may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.

The sha values for the release are

(For x86_64 architecture)
The image digest is sha256:a346fc0c84644e64c726013a98bef0f75e58f246fce1faa83fb6bbbc6d4050aa

(For s390x architecture)
The image digest is sha256:a5a493a8eda0bd2799cb2caffe39e4ac3bd931af2bdb961cc8e6638e17e7703a

(For ppc64le architecture)
The image digest is sha256:490211f45a752507d751152e6f8d7574dcc0fd3c840dce615256d0c53a869b18

(For aarch64 architecture)
The image digest is sha256:ea95f560ceee5ec31a57060c8e88dd4b0ced3f6e52895d1d089bb9df67423b0d

All OpenShift Container Platform 4.14 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.14/updating/updating_a_cluster/updating-cluster-cli.html

Affected Products

  • Red Hat OpenShift Container Platform 4.14 for RHEL 9 x86_64
  • Red Hat OpenShift Container Platform 4.14 for RHEL 8 x86_64
  • Red Hat OpenShift Container Platform for Power 4.14 for RHEL 9 ppc64le
  • Red Hat OpenShift Container Platform for Power 4.14 for RHEL 8 ppc64le
  • Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.14 for RHEL 9 s390x
  • Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.14 for RHEL 8 s390x
  • Red Hat OpenShift Container Platform for ARM 64 4.14 for RHEL 9 aarch64
  • Red Hat OpenShift Container Platform for ARM 64 4.14 for RHEL 8 aarch64

Fixes

  • BZ - 2243296 - CVE-2023-39325 golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
  • BZ - 2245180 - CVE-2023-45142 opentelemetry: DoS vulnerability in otelhttp
  • BZ - 2251198 - CVE-2023-47108 opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics
  • OCPBUGS-18438 - DNS Resolution not working fine for ingress operator through SOCKS proxy
  • OCPBUGS-22240 - Console login flow forgot query parameters / Deeplinking doesn't work
  • OCPBUGS-22776 - dualstack installation with additional networks not working
  • OCPBUGS-22978 - [IBMCloud] Add IPI support for new region eu-es (Madrid)
  • OCPBUGS-23169 - Multi-vcenter and wrong user/password in secret/vmware-vsphere-cloud-credentials causes the vSphere CSI Driver controller pods restarting?
  • OCPBUGS-23202 - A Master Machine is stuck in deleting state after replacing the network by a wrong one in CPMS and updating it back
  • OCPBUGS-23371 - OVN secondary network annotation timeout in hosted pod using Kubevirt provider
  • OCPBUGS-23387 - [4.14] pod IP routing broken if KubeVirt VM migration fails
  • OCPBUGS-23399 - Power VS: Zones that have transitioned to PER will fail to deploy
  • OCPBUGS-24047 - Machine API Operator vSphere controller references retired KCS for HW Version Migrations
  • OCPBUGS-24197 - [release-4.14] Add client version in must-gather summary
  • OCPBUGS-24209 - [release-4.14] Reduce shared informer mermory usage
  • OCPBUGS-24254 - [release-4.14] Gather HelmChart Information
  • OCPBUGS-24269 - OAuthClient 'openshift-cli-client' is missing for HyperShift Guest Clusters causing `oc login --web` fails
  • OCPBUGS-24293 - Metrics: ConsolePlugins must no longer needs to be grouped
  • OCPBUGS-24352 - [release-4.14] User can impersonate to all the user without the appropriate rolebinding
  • OCPBUGS-24397 - openshift-gcp-routes.sh exits prematurely, causing critical systemd service restarts
  • OCPBUGS-24432 - [release-4.14] String filter on events page doesn't work well
  • OCPBUGS-24460 - oc process command fails while running it with a template file
  • OCPBUGS-24528 - concurrent map write error in linux ptp daemon
  • OCPBUGS-24596 - On an SNO the new CA certificate is not loaded after updating user-ca-bundle configmap
  • OCPBUGS-24633 - The traffic between worker node and external host got broken after delete ipsec-host pods
  • OCPBUGS-25305 - Tuned Profiles going degraded due to the extra net.core.rps_default_mask configuration in openshift-node-performance-xxx-profile
  • OCPBUGS-6725 - agent wait-for bootstrap-complete command spews "did not complete" messages