Headline
RHSA-2022:1361: Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.10.0 RPM security,enhancement&bugfix update
Updated images that include numerous enhancements, security, and bug fixes are now available for Red Hat OpenShift Data Foundation 4.10.0 on Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2021-36221: golang: net/http/httputil: panic due to racy read of persistConn after handler panic
- CVE-2021-43565: golang.org/x/crypto: empty plaintext packet causes panic
- CVE-2021-44716: golang: net/http: limit growth of header canonicalization cache
- CVE-2021-44717: golang: syscall: don’t close fd 0 on ForkExec error
Skip to navigation Skip to main content
Utilities
- Subscriptions
- Downloads
- Containers
- Support Cases
Infrastructure and Management
- Red Hat Enterprise Linux
- Red Hat Virtualization
- Red Hat Identity Management
- Red Hat Directory Server
- Red Hat Certificate System
- Red Hat Satellite
- Red Hat Subscription Management
- Red Hat Update Infrastructure
- Red Hat Insights
- Red Hat Ansible Automation Platform
Cloud Computing
- Red Hat OpenShift
- Red Hat CloudForms
- Red Hat OpenStack Platform
- Red Hat OpenShift Container Platform
- Red Hat OpenShift Data Science
- Red Hat OpenShift Online
- Red Hat OpenShift Dedicated
- Red Hat Advanced Cluster Security for Kubernetes
- Red Hat Advanced Cluster Management for Kubernetes
- Red Hat Quay
- Red Hat CodeReady Workspaces
- Red Hat OpenShift Service on AWS
Storage
- Red Hat Gluster Storage
- Red Hat Hyperconverged Infrastructure
- Red Hat Ceph Storage
- Red Hat OpenShift Data Foundation
Runtimes
- Red Hat Runtimes
- Red Hat JBoss Enterprise Application Platform
- Red Hat Data Grid
- Red Hat JBoss Web Server
- Red Hat Single Sign On
- Red Hat support for Spring Boot
- Red Hat build of Node.js
- Red Hat build of Thorntail
- Red Hat build of Eclipse Vert.x
- Red Hat build of OpenJDK
- Red Hat build of Quarkus
- Red Hat CodeReady Studio
Integration and Automation
- Red Hat Process Automation
- Red Hat Process Automation Manager
- Red Hat Decision Manager
All Products
Issued:
2022-04-13
Updated:
2022-04-13
RHSA-2022:1361 - Security Advisory
- Overview
- Updated Packages
Synopsis
Important: Red Hat OpenShift Data Foundation 4.10.0 RPM security,enhancement&bugfix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
Updated images that include numerous enhancements, security, and bug fixes
are now available for Red Hat OpenShift Data Foundation 4.10.0 on Red Hat
Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Description
Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Data Foundation provisions a multicloud data management service with an S3 compatible API.
Security Fix(es):
- golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)
- golang: syscall: don’t close fd 0 on ForkExec error (CVE-2021-44717)
- golang: net/http: limit growth of header canonicalization cache (CVE-2021-44716)
- golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
Bug Fix(es):
These updated packages include numerous enhancements and bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat OpenShift Data Foundation Release Notes for information on the most significant of these changes:
https://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.10/html/4.10_release_notes/index
All Red Hat OpenShift Data Foundation users are advised to upgrade to these updated packages, which provide numerous bug fixes and enhancements.
or more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information refer to the CVE
page(s) listed in the References section.
Affected Products
- Red Hat OpenShift Data Foundation 4 x86_64
- Red Hat OpenShift Data Foundation for IBM Power, little endian 4 ppc64le
- Red Hat OpenShift Data Foundation for IBM Z and LinuxONE 4 s390x
Fixes
- BZ - 1995656 - CVE-2021-36221 golang: net/http/httputil: panic due to racy read of persistConn after handler panic
- BZ - 2026342 - Noobaa diagnose command is not working properly in must-gather
- BZ - 2030787 - CVE-2021-43565 golang.org/x/crypto: empty plaintext packet causes panic
- BZ - 2030801 - CVE-2021-44716 golang: net/http: limit growth of header canonicalization cache
- BZ - 2030806 - CVE-2021-44717 golang: syscall: don’t close fd 0 on ForkExec error
CVEs
- CVE-2021-36221
- CVE-2021-43565
- CVE-2021-44716
- CVE-2021-44717
Red Hat OpenShift Data Foundation 4
SRPM
mcg-5.10.0-72.el8.src.rpm
SHA-256: 6f43c5930e141674b18c404d06680cb4f173b7cc23d31d01976386fd374930ac
x86_64
mcg-5.10.0-72.el8.x86_64.rpm
SHA-256: 9cbb1b1279d921a1d0cf62dc383c204c0721eed3ed6d297156fb37e516640ee1
mcg-redistributable-5.10.0-72.el8.x86_64.rpm
SHA-256: b764cce09d0aca8996e100dccba3a543ba35e51749b6ac4171bde316488ebe5b
Red Hat OpenShift Data Foundation for IBM Power, little endian 4
SRPM
mcg-5.10.0-72.el8.src.rpm
SHA-256: 6f43c5930e141674b18c404d06680cb4f173b7cc23d31d01976386fd374930ac
ppc64le
mcg-5.10.0-72.el8.ppc64le.rpm
SHA-256: 8735a2e59ee5d6139694bf226fcb0de82d01a4d3fc8d930e677c73868634fb6b
Red Hat OpenShift Data Foundation for IBM Z and LinuxONE 4
SRPM
mcg-5.10.0-72.el8.src.rpm
SHA-256: 6f43c5930e141674b18c404d06680cb4f173b7cc23d31d01976386fd374930ac
s390x
mcg-5.10.0-72.el8.s390x.rpm
SHA-256: 7866d3b688941b45731ae6feb30633e4324aa166e8ff313531df36c44d3d88a7
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.