First published: Mon Apr 05 2021(Updated: )
Red Hat OpenShift Container Platform is Red Hat's cloud computing<br>Kubernetes application platform solution designed for on-premise or private<br>cloud deployments.<br>This advisory contains the RPM packages for Red Hat OpenShift Container<br>Platform 4.7.5. See the following advisory for the container images for<br>this release:<br><a href="https://access.redhat.com/errata/RHSA-2021:1005" target="_blank">https://access.redhat.com/errata/RHSA-2021:1005</a> All OpenShift Container Platform 4.7 users are advised to upgrade to these<br>updated packages and images when they are available in the appropriate<br>release channel. To check for available updates, use the OpenShift Console<br>or the CLI oc command. Instructions for upgrading a cluster are available<br>at<br><a href="https://docs.openshift.com/container-platform/4.7/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor" target="_blank">https://docs.openshift.com/container-platform/4.7/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor</a> Security Fix(es):<br><li> gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)</li> <li> containernetworking-cni: Arbitrary path injection via type field in CNI configuration (CVE-2021-20206)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Bug Fix(es):<br><li> Reports that has specified a retention should not be requeued in the sync handler (BZ#1929042)</li> <li> Placeholder bug for OCP 4.7.0 extras release (BZ#1944017)</li>
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.