-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat OpenShift Data Foundation 4.12.1 security bug fix update Advisory ID: RHSA-2023:1170-01 Product: RHODF Advisory URL: https://access.redhat.com/errata/RHSA-2023:1170 Issue date: 2023-03-08 CVE Names: CVE-2020-10735 CVE-2021-4238 CVE-2021-28861 CVE-2022-3650 CVE-2022-4415 CVE-2022-40897 CVE-2022-45061 CVE-2022-47629 ===================================================================== 1. Summary: Red Hat OpenShift Data Foundation 4.12.1 Bug Fix Update Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Data Foundation. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Data Foundation provisions a multicloud data management service with an S3 compatible API. Security Fix: * goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be (CVE-2021-4238) For more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE pages listed in the References section. Bug fixes: * Previously, wrong and unclear error messages were displayed on Failover/Relocate modal. With this fix, appropriate error messages with links to documentation is added to most of the error messages. (BZ#2161903) * With this update, the read operations performance of the Multicloud Object Gateway database is improved. To achieve this, a certain regular expressions that are used by some of the queries that run against the database to serve the required data are pre-compiled. This saves time when run in real-time. (BZ#2149861) * Previously, the default container created in Azure was with public access enabled. With this fix, the default container created will not have the public access enabled which means `AllowBlobPublicAccess` is set to false. (BZ#2168838) * With this update, the `multicluster-orchestrator` operator is listed under the operators supporting disconnected mode installations. To list this operator, the disconnected mode support annotation is added to CSV as the user interface (UI) uses this annotation. (BZ#2166223) All users of Red Hat OpenShift Data Foundation are advised to upgrade to these updated images, which provide these bug fixes. 3. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 4. Bugs fixed (https://bugzilla.redhat.com/): 2123501 - [RDR] Pod stuck due to error "applyFSGroup failed for vol" for a PVC that was relocated 2156729 - CVE-2021-4238 goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be 2159466 - [MDR RDR] Application user unable to invoke Failover and Relocate actions 2161652 - Namespace store fails to get created via the ODF UI 2165493 - [MCG] Azure bs/ns creation fails with target bucket does not exists 2165960 - [4.12.z clone] ocs-operator CSV is missing disconnected env annotation. 2166220 - [RFE] ODF bluewash introduction in 4.12.x 2166223 - CSV is missing disconnected env annotation and relatedImages spec 2167301 - [RFE] ODF bluewash introduction in 4.12.x 2167950 - CSV is missing disconnected env annotation and relatedImages spec 2168637 - fix redirect link to operator details page (OCS dashboard) 2170106 - Update to RHCS 5.3z1 Ceph container image at ODF-4.12.1 2170449 - Include at ODF 4.12 container images the RHEL8 CVE fix on "libksba" 5. References: https://access.redhat.com/security/cve/CVE-2020-10735 https://access.redhat.com/security/cve/CVE-2021-4238 https://access.redhat.com/security/cve/CVE-2021-28861 https://access.redhat.com/security/cve/CVE-2022-3650 https://access.redhat.com/security/cve/CVE-2022-4415 https://access.redhat.com/security/cve/CVE-2022-40897 https://access.redhat.com/security/cve/CVE-2022-45061 https://access.redhat.com/security/cve/CVE-2022-47629 https://access.redhat.com/security/updates/classification/#important 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBZAkjw9zjgjWX9erEAQhvEhAAjCAp2/GQUI0yUkWoltJ1BKFH9lyeceh3 KuH5BTN/05smpatHAzv1FzQDXWDi5FdXw9F/EPGfKMK3V86LydVGMjg0OR+ay9NZ ffx9V8RMpyogLX6/P17xtthp+6JHNAZrkjDgNADByVOQppKqQulMIgzsT4BqvuR7 kP/5PDmHdRv6667rTbJFnYJ/KbWq3Yw5yCfocuSViePFEBHcGKZhA39HSs4hWvVe C7jKaK46AIJ5+mEyHzXHIvjb1VnEYdCHrOrYTf6OIx+TXdGnWi5oOQEFrxe/s7D5 G6mk/PAq42yNds/a7ZKg3kiDQhkjnL+2DejnIils2teLtGTSGSOsyv9qX3v0mAPP SM/18C6zH6J1ZjAEIB6byhsGKPbhyi2CybBvTkoylri5oEnD6UR6Z8tREGNusSB8 aomD4SYAcLTZSE1/8pZzTvPmrsEc+fV8LztDYFOK9nm7BDvFPmtco4bpQPV2gT6H xSYmRMhj5aGkg5YxS08+EvfS78VQqzxV+Jx5Hr0nU1QT5cugTgr+RxfBPEVyyAU6 yGg5+kqSa5jGxEJMlNt5NAAHckP7StDdPnye217S1b0P8oeY8EpYJ7xUjHmRuIHQ Vkhp5LMnZFIJwv+Nh9EywMfhB3I9acMAQvRutW+IlY6L6XqJtenqbuUoWA4MO5vV YImyLRk8vWk= =6IQw -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce