Headline
RHSA-2022:0114: Red Hat Security Advisory: OpenShift Container Platform 4.7.41 security update
Red Hat OpenShift Container Platform release 4.7.41 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2021-39241: haproxy: an HTTP method name may contain a space followed by the name of a protected resource
- CVE-2021-40346: haproxy: request smuggling attack or response splitting via duplicate content-length header
Skip to navigation Skip to main content
Utilities
- Subscriptions
- Downloads
- Containers
- Support Cases
Infrastructure and Management
- Red Hat Enterprise Linux
- Red Hat Virtualization
- Red Hat Identity Management
- Red Hat Directory Server
- Red Hat Certificate System
- Red Hat Satellite
- Red Hat Subscription Management
- Red Hat Update Infrastructure
- Red Hat Insights
- Red Hat Ansible Automation Platform
Cloud Computing
- Red Hat OpenShift
- Red Hat CloudForms
- Red Hat OpenStack Platform
- Red Hat OpenShift Container Platform
- Red Hat OpenShift Data Science
- Red Hat OpenShift Online
- Red Hat OpenShift Dedicated
- Red Hat Advanced Cluster Security for Kubernetes
- Red Hat Advanced Cluster Management for Kubernetes
- Red Hat Quay
- Red Hat CodeReady Workspaces
- Red Hat OpenShift Service on AWS
Storage
- Red Hat Gluster Storage
- Red Hat Hyperconverged Infrastructure
- Red Hat Ceph Storage
- Red Hat OpenShift Data Foundation
Runtimes
- Red Hat Runtimes
- Red Hat JBoss Enterprise Application Platform
- Red Hat Data Grid
- Red Hat JBoss Web Server
- Red Hat Single Sign On
- Red Hat support for Spring Boot
- Red Hat build of Node.js
- Red Hat build of Thorntail
- Red Hat build of Eclipse Vert.x
- Red Hat build of OpenJDK
- Red Hat build of Quarkus
- Red Hat CodeReady Studio
Integration and Automation
- Red Hat Process Automation
- Red Hat Process Automation Manager
- Red Hat Decision Manager
All Products
Issued:
2022-01-19
Updated:
2022-01-19
RHSA-2022:0114 - Security Advisory
- Overview
- Updated Packages
Synopsis
Moderate: OpenShift Container Platform 4.7.41 security update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
Red Hat OpenShift Container Platform release 4.7.41 is now available with
updates to packages and images that fix several bugs and add enhancements.
This release includes a security update for Red Hat OpenShift Container Platform 4.7.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Description
Red Hat OpenShift Container Platform is Red Hat’s cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.7.41. See the following advisory for the container images for this release:
https://access.redhat.com/errata/RHBA-2022:0117
Security Fix(es):
- haproxy: an HTTP method name may contain a space followed by the name of
a protected resource (CVE-2021-39241)
- haproxy: request smuggling attack or response splitting via duplicate
content-length header (CVE-2021-40346)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
All OpenShift Container Platform 4.7 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor
Affected Products
- Red Hat OpenShift Container Platform 4.7 for RHEL 8 x86_64
- Red Hat OpenShift Container Platform 4.7 for RHEL 7 x86_64
- Red Hat OpenShift Container Platform for Power 4.7 for RHEL 8 ppc64le
- Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.7 for RHEL 8 s390x
Fixes
- BZ - 1995107 - CVE-2021-39241 haproxy: an HTTP method name may contain a space followed by the name of a protected resource
- BZ - 2000599 - CVE-2021-40346 haproxy: request smuggling attack or response splitting via duplicate content-length header
Red Hat OpenShift Container Platform 4.7 for RHEL 8
SRPM
atomic-openshift-service-idler-4.7.0-202201082234.p0.g39cfc66.assembly.stream.el8.src.rpm
SHA-256: 5345c3763b509decd11d894a9caa9c5bf5a876998515704a18aa559083b373a8
cri-o-1.20.6-5.rhaos4.7.git8594c20.el8.src.rpm
SHA-256: 3fc358678dce7725e60f1f1e03bf534a112a8c9b3c6dc22f89b0adfe512562d5
haproxy-2.0.19-2.el8.src.rpm
SHA-256: 30ed52e870e479e7a47ff03aafc2e9c4e35d088f5a556167eccb21502d1a211a
openshift-4.7.0-202201082234.p0.ge880017.assembly.stream.el8.src.rpm
SHA-256: 063e1ea01278990efd4e3b67ffe8058d46d17a81d72140f2ec76b83bb52ef7c6
openshift-clients-4.7.0-202201082234.p0.g25914b8.assembly.stream.el8.src.rpm
SHA-256: 86f1ceda451d897faccacb8a5aed3910fc7b61ddcda396661bae3c06d0a409d1
openshift-kuryr-4.7.0-202201082234.p0.g72de60e.assembly.stream.el8.src.rpm
SHA-256: 4ceca5f40cd53798ab3a9593f6b0447208ad0ee227ddd0f6255557b1c51ca361
x86_64
atomic-openshift-service-idler-4.7.0-202201082234.p0.g39cfc66.assembly.stream.el8.x86_64.rpm
SHA-256: 7ba49d16325163322de4340478f3a5e189bd939de6097d40eb46e2b884b0d412
cri-o-1.20.6-5.rhaos4.7.git8594c20.el8.x86_64.rpm
SHA-256: 077574526f28735dde52d792f8af68a2a328c0b28e01670b6e76f3bcff8152cd
cri-o-debuginfo-1.20.6-5.rhaos4.7.git8594c20.el8.x86_64.rpm
SHA-256: 344447a1ea29027b3776dc379182d195dcab79e9aee8cc06d55aeca8af12c724
cri-o-debugsource-1.20.6-5.rhaos4.7.git8594c20.el8.x86_64.rpm
SHA-256: ec0e6825d49407f9192b4cb6428fd841d899e16477db8d01880a083659436fdd
haproxy-debugsource-2.0.19-2.el8.x86_64.rpm
SHA-256: fdf2e420c7253e71135b41a426e9004f188e7476272a5cc43d673407ff748452
haproxy20-2.0.19-2.el8.x86_64.rpm
SHA-256: 52249741d50bbebabceac57b887416f62a98db423aafb790dc30a803087e14c5
haproxy20-debuginfo-2.0.19-2.el8.x86_64.rpm
SHA-256: acfa7a7b4d7c730613c3f6a04c21e94bd9a5eba1ed66232df3a1bcced606057e
openshift-clients-4.7.0-202201082234.p0.g25914b8.assembly.stream.el8.x86_64.rpm
SHA-256: c990cea149de7a313723c229c6edf263e9e04b498bfb9a86b3d41cb867e7c96f
openshift-clients-redistributable-4.7.0-202201082234.p0.g25914b8.assembly.stream.el8.x86_64.rpm
SHA-256: c39615b36931f10e4feac113f40a76f8f4759da39e6558ce15fcb290860509f0
openshift-hyperkube-4.7.0-202201082234.p0.ge880017.assembly.stream.el8.x86_64.rpm
SHA-256: a43de69edfb3637d35bd91fb9966f6dc030dbf4643fcfba8b82b2ee39166d263
openshift-kuryr-cni-4.7.0-202201082234.p0.g72de60e.assembly.stream.el8.noarch.rpm
SHA-256: d707a3c35a1cab19b61b73f621a7a668b8bef49c7cf6a8616fb0843405bf8e57
openshift-kuryr-common-4.7.0-202201082234.p0.g72de60e.assembly.stream.el8.noarch.rpm
SHA-256: 679d0d198c08f7c5c7a01e4ee895d2cdf3223877e13d6472df8835cf77cb6d71
openshift-kuryr-controller-4.7.0-202201082234.p0.g72de60e.assembly.stream.el8.noarch.rpm
SHA-256: 18c5b2f5aafa4700e8aad90d5237678fd20061926754cf3eddcf082a393e323d
python3-kuryr-kubernetes-4.7.0-202201082234.p0.g72de60e.assembly.stream.el8.noarch.rpm
SHA-256: 7a3479c5231312b37e7f06b171baa3d525a5908793c659f8f057b6025b8cd410
Red Hat OpenShift Container Platform 4.7 for RHEL 7
SRPM
cri-o-1.20.6-5.rhaos4.7.git8594c20.el7.src.rpm
SHA-256: 85c8ceac0d2536d1bdad87598e18ed44d2011be76b103fd9ac76e7a12bde863d
haproxy-2.0.19-2.el7.src.rpm
SHA-256: c5a6668deef5f351c859a499bfe2abfd8335299a10e0826d9a963564c3105d2f
openshift-4.7.0-202201082234.p0.ge880017.assembly.stream.el7.src.rpm
SHA-256: 9bac87ba848fbddf9f7fb2eee5abcb3a1fa5334d0ee02e8dbcd00247195caaf2
openshift-ansible-4.7.0-202201082234.p0.g4a5273a.assembly.stream.el7.src.rpm
SHA-256: 696dcc6d09307e608b56fd9d789855b8314503ecfc88e0f63359e1351c24ab79
openshift-clients-4.7.0-202201082234.p0.g25914b8.assembly.stream.el7.src.rpm
SHA-256: 5f4c52d61591b3b24d5bb422ed0045ba2bf2b34b6edd7431c95cb23cccd430aa
x86_64
cri-o-1.20.6-5.rhaos4.7.git8594c20.el7.x86_64.rpm
SHA-256: 26ec26a93102205f5728ae311a854e72e7c49e78c9614f90a23b377f011c510e
cri-o-debuginfo-1.20.6-5.rhaos4.7.git8594c20.el7.x86_64.rpm
SHA-256: 65df310d88b1396502bdb33144bb10cffde5e7c3f39c0d6a5828bd2031db6355
haproxy-debuginfo-2.0.19-2.el7.x86_64.rpm
SHA-256: 02859a91ae1c81d56aa82532d92989a9c70c24a69afa44d753233dd871db43e9
haproxy20-2.0.19-2.el7.x86_64.rpm
SHA-256: 8154b125afa00cbce0f451fc0a3814186360e85a0fa036a5ad4fb4d739ba77ac
openshift-ansible-4.7.0-202201082234.p0.g4a5273a.assembly.stream.el7.noarch.rpm
SHA-256: f38c48e216d85e136e75736a20f0cd8d46d38c0d8c7378a7fcdf077021052234
openshift-ansible-test-4.7.0-202201082234.p0.g4a5273a.assembly.stream.el7.noarch.rpm
SHA-256: 1422231d097b5f2528e090c103cdee14ce443781f000dd0fcdd5bac827692e0a
openshift-clients-4.7.0-202201082234.p0.g25914b8.assembly.stream.el7.x86_64.rpm
SHA-256: 5ab0cdef3cb7da068f74309d28bb760ca9aaf4ce58889b89df9d159cfeaab6fa
openshift-clients-redistributable-4.7.0-202201082234.p0.g25914b8.assembly.stream.el7.x86_64.rpm
SHA-256: 4f42a9856f91c2c9d87fe3ba72b6d08746f88d9916be9aaac0f9e4541c602f92
openshift-hyperkube-4.7.0-202201082234.p0.ge880017.assembly.stream.el7.x86_64.rpm
SHA-256: 3bb7a4f996a8916b1a511344a9a8f98a25632f4245235ce64ae6a2c04137ee78
Red Hat OpenShift Container Platform for Power 4.7 for RHEL 8
SRPM
atomic-openshift-service-idler-4.7.0-202201082234.p0.g39cfc66.assembly.stream.el8.src.rpm
SHA-256: 5345c3763b509decd11d894a9caa9c5bf5a876998515704a18aa559083b373a8
cri-o-1.20.6-5.rhaos4.7.git8594c20.el8.src.rpm
SHA-256: 3fc358678dce7725e60f1f1e03bf534a112a8c9b3c6dc22f89b0adfe512562d5
haproxy-2.0.19-2.el8.src.rpm
SHA-256: 30ed52e870e479e7a47ff03aafc2e9c4e35d088f5a556167eccb21502d1a211a
openshift-4.7.0-202201082234.p0.ge880017.assembly.stream.el8.src.rpm
SHA-256: 063e1ea01278990efd4e3b67ffe8058d46d17a81d72140f2ec76b83bb52ef7c6
openshift-clients-4.7.0-202201082234.p0.g25914b8.assembly.stream.el8.src.rpm
SHA-256: 86f1ceda451d897faccacb8a5aed3910fc7b61ddcda396661bae3c06d0a409d1
openshift-kuryr-4.7.0-202201082234.p0.g72de60e.assembly.stream.el8.src.rpm
SHA-256: 4ceca5f40cd53798ab3a9593f6b0447208ad0ee227ddd0f6255557b1c51ca361
ppc64le
atomic-openshift-service-idler-4.7.0-202201082234.p0.g39cfc66.assembly.stream.el8.ppc64le.rpm
SHA-256: 00f307561479f7c2c0dbd841688af8ade8e5cc7eb1aae4aba7cc830f8409a4f5
cri-o-1.20.6-5.rhaos4.7.git8594c20.el8.ppc64le.rpm
SHA-256: d07074cc9c2804e92709f831aa84acdf2c7ab6ffa5506c62e322ff0b3303b356
cri-o-debuginfo-1.20.6-5.rhaos4.7.git8594c20.el8.ppc64le.rpm
SHA-256: 3b7d1f5874f4077f9ae2d3020cb693779d86e59695347ebda932ba805bb2952f
cri-o-debugsource-1.20.6-5.rhaos4.7.git8594c20.el8.ppc64le.rpm
SHA-256: 85953bc096ddf31cbe228671b73df811637e2ea034bb5e5196f9c7577de3793d
haproxy-debugsource-2.0.19-2.el8.ppc64le.rpm
SHA-256: ffd2da0fb9f5b8cb3bd610f95a20e6c9ada4942386a6ccee1ec0fbaef821d347
haproxy20-2.0.19-2.el8.ppc64le.rpm
SHA-256: 452af89d35e545c0b6299ab9dec2f548f3dbb2bb274c547f4b9152c55d04cb93
haproxy20-debuginfo-2.0.19-2.el8.ppc64le.rpm
SHA-256: 37c1c3e1563faab1684c3ee8190951955de6ce44e1a9cc0572683301c7e21120
openshift-clients-4.7.0-202201082234.p0.g25914b8.assembly.stream.el8.ppc64le.rpm
SHA-256: 962edf30d439dd03e614e24b7cbc49d991eb4ebb1798686a20d07e9eab40e343
openshift-hyperkube-4.7.0-202201082234.p0.ge880017.assembly.stream.el8.ppc64le.rpm
SHA-256: 004ebf69c04015419accba35ff8df2667a6990bb4ef61ff6d77f5ee9327f500d
openshift-kuryr-cni-4.7.0-202201082234.p0.g72de60e.assembly.stream.el8.noarch.rpm
SHA-256: d707a3c35a1cab19b61b73f621a7a668b8bef49c7cf6a8616fb0843405bf8e57
openshift-kuryr-common-4.7.0-202201082234.p0.g72de60e.assembly.stream.el8.noarch.rpm
SHA-256: 679d0d198c08f7c5c7a01e4ee895d2cdf3223877e13d6472df8835cf77cb6d71
openshift-kuryr-controller-4.7.0-202201082234.p0.g72de60e.assembly.stream.el8.noarch.rpm
SHA-256: 18c5b2f5aafa4700e8aad90d5237678fd20061926754cf3eddcf082a393e323d
python3-kuryr-kubernetes-4.7.0-202201082234.p0.g72de60e.assembly.stream.el8.noarch.rpm
SHA-256: 7a3479c5231312b37e7f06b171baa3d525a5908793c659f8f057b6025b8cd410
Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.7 for RHEL 8
SRPM
atomic-openshift-service-idler-4.7.0-202201082234.p0.g39cfc66.assembly.stream.el8.src.rpm
SHA-256: 5345c3763b509decd11d894a9caa9c5bf5a876998515704a18aa559083b373a8
cri-o-1.20.6-5.rhaos4.7.git8594c20.el8.src.rpm
SHA-256: 3fc358678dce7725e60f1f1e03bf534a112a8c9b3c6dc22f89b0adfe512562d5
haproxy-2.0.19-2.el8.src.rpm
SHA-256: 30ed52e870e479e7a47ff03aafc2e9c4e35d088f5a556167eccb21502d1a211a
openshift-4.7.0-202201082234.p0.ge880017.assembly.stream.el8.src.rpm
SHA-256: 063e1ea01278990efd4e3b67ffe8058d46d17a81d72140f2ec76b83bb52ef7c6
openshift-clients-4.7.0-202201082234.p0.g25914b8.assembly.stream.el8.src.rpm
SHA-256: 86f1ceda451d897faccacb8a5aed3910fc7b61ddcda396661bae3c06d0a409d1
openshift-kuryr-4.7.0-202201082234.p0.g72de60e.assembly.stream.el8.src.rpm
SHA-256: 4ceca5f40cd53798ab3a9593f6b0447208ad0ee227ddd0f6255557b1c51ca361
s390x
atomic-openshift-service-idler-4.7.0-202201082234.p0.g39cfc66.assembly.stream.el8.s390x.rpm
SHA-256: 2e389b93a1ed27e14252de3ac156c7de2deaa141cedf59baeff4c36dcb7c978a
cri-o-1.20.6-5.rhaos4.7.git8594c20.el8.s390x.rpm
SHA-256: 921db88ed3d6ee87a9221b13a46829fce7eaf080b5e5b38e8249b9c824c14a76
cri-o-debuginfo-1.20.6-5.rhaos4.7.git8594c20.el8.s390x.rpm
SHA-256: 4c4edc7f879b413f00233f90f3a2efe96b65d8f2c45dc87104c9500651f34067
cri-o-debugsource-1.20.6-5.rhaos4.7.git8594c20.el8.s390x.rpm
SHA-256: bc2e70fe0e776333432126a84613422a57c408a5bea04d0ad179a1028296e502
haproxy-debugsource-2.0.19-2.el8.s390x.rpm
SHA-256: 42bb7a235a5ef2bda9881c6fbd7dace1fdbdca32f5131a664fc18fb8e3128b2b
haproxy20-2.0.19-2.el8.s390x.rpm
SHA-256: a097926e2321d41cde122a45a3a68ca6ce6eea6569b3f0c4fda4c1a75438f019
haproxy20-debuginfo-2.0.19-2.el8.s390x.rpm
SHA-256: 223e146fbfc7affe9f510fa14ea417e3fac725ea66abdfe6a9c25993ffc6faa5
openshift-clients-4.7.0-202201082234.p0.g25914b8.assembly.stream.el8.s390x.rpm
SHA-256: 13480ddd9e3dfc2a562351d66e0e10e2285b2c538912c4e358c818a60b8dcdd5
openshift-hyperkube-4.7.0-202201082234.p0.ge880017.assembly.stream.el8.s390x.rpm
SHA-256: 89e1c9b88c44d60d615fd9fd388a230c3bb207fc0c4bdba547d94889891d86c0
openshift-kuryr-cni-4.7.0-202201082234.p0.g72de60e.assembly.stream.el8.noarch.rpm
SHA-256: d707a3c35a1cab19b61b73f621a7a668b8bef49c7cf6a8616fb0843405bf8e57
openshift-kuryr-common-4.7.0-202201082234.p0.g72de60e.assembly.stream.el8.noarch.rpm
SHA-256: 679d0d198c08f7c5c7a01e4ee895d2cdf3223877e13d6472df8835cf77cb6d71
openshift-kuryr-controller-4.7.0-202201082234.p0.g72de60e.assembly.stream.el8.noarch.rpm
SHA-256: 18c5b2f5aafa4700e8aad90d5237678fd20061926754cf3eddcf082a393e323d
python3-kuryr-kubernetes-4.7.0-202201082234.p0.g72de60e.assembly.stream.el8.noarch.rpm
SHA-256: 7a3479c5231312b37e7f06b171baa3d525a5908793c659f8f057b6025b8cd410
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.