First published: Mon Apr 05 2021(Updated: )
Red Hat OpenShift Container Platform is Red Hat's cloud computing<br>Kubernetes application platform solution designed for on-premise or private<br>cloud deployments.<br>Red Hat OpenShift Container Platform is Red Hat's cloud computing<br>Kubernetes application platform solution designed for on-premise or private<br>cloud deployments.<br>This advisory contains the container images for Red Hat OpenShift Container<br>Platform 4.7.5. See the following advisory for the RPM packages for<br>this release:<br><a href="https://access.redhat.com/errata/RHSA-2021:1006" target="_blank">https://access.redhat.com/errata/RHSA-2021:1006</a> All OpenShift Container Platform 4.7 users are advised to upgrade to these<br>updated packages and images when they are available in the appropriate<br>release channel. To check for available updates, use the OpenShift Console<br>or the CLI oc command. Instructions for upgrading a cluster are available<br>at<br><a href="https://docs.openshift.com/container-platform/4.7/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor" target="_blank">https://docs.openshift.com/container-platform/4.7/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor</a> Security Fix(es):<br><li> gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)</li> <li> containernetworking-cni: Arbitrary path injection via type field in CNI configuration (CVE-2021-20206)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Additional Changes:<br>This update also fixes several bugs. Documentation for these changes is available from the Release Notes document linked to in the References section.<br>You may download the oc tool and use it to inspect release image metadata<br>as follows:<br>(For x86_64 architecture)<br>$ oc adm release info<br>quay.io/openshift-release-dev/ocp-release:4.6.20-x86_64<br>The image digest is<br>sha256:0a4c44daf1666f069258aa983a66afa2f3998b78ced79faa6174e0a0f438f0a5<br>(For s390x architecture)<br>$ oc adm release info<br>quay.io/openshift-release-dev/ocp-release:4.6.20-s390x<br>The image digest is<br>sha256:3fc802aafb72402768bbf1b19ce7c6de95256e5cc50799390e63f40d96cec3cd<br>(For ppc64le architecture)<br>$ oc adm release info<br>quay.io/openshift-release-dev/ocp-release:4.6.20-ppc64le<br>The image digest is<br>sha256:5cf6b61198337cd0950e63296be4e48e991721ac17c625f7fd77cf557f08efc7
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Container Platform for IBM LinuxONE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2021:1005 is classified as moderate.
To fix RHSA-2021:1005, it is recommended to update the affected software packages to the latest available versions.
RHSA-2021:1005 affects the Red Hat OpenShift Container Platform.
RHSA-2021:1005 was released on February 24, 2021.
Currently, there are no official workarounds for RHSA-2021:1005; updating is the recommended approach.