QID 770111

QID 770111: Red Hat OpenShift Container Platform 4.8 Security Update (RHSA-2021-2437)

Red Hat openshift container platform is Red Hat's cloud computing kubernetes application platform solution designed for on-premise or private cloud deployments.

Security Fix(es):
  • gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (cve-2021-3121)
  • golang: crypto/elliptic: incorrect operations on the p-224 curve (cve-2021-3114)
  • openshift: injected service-ca.crt incorrectly contains additional internal cas (cve-2021-3636)
  • python-eventlet: improper handling of highly compressed data and memory allocation with excessive size allows dos (cve-2021-21419)
  • jenkins-2-plugins/matrix-auth: incorrect permission checks in matrix authorization strategy plugin (cve-2021-21623)
  • jenkins-2-plugins/credentials: reflected xss vulnerability in credentials plugin (cve-2021-21648)
  • kubernetes: validating admission webhook does not observe some previous fields (cve-2021-25735)
  • jenkins: lack of type validation in agent related rest api (cve-2021-21639)
  • jenkins: view name validation bypass (cve-2021-21640)
  • kubernetes: holes in endpointslice validation enable host network hijack (cve-2021-25737)

Affected Products:

  • Red Hat openshift container platform 4.8 for rhel 8 x86_64
  • Red Hat openshift container platform 4.8 for rhel 7 x86_64
  • Red Hat openshift container platform for power 4.8 for rhel 8 ppc64le
  • Red Hat openshift container platform for ibm z and linuxone 4.8 for rhel 8 s390x



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

On successful exploitation, it could allow an attacker to execute code.

  • CVSS V3 rated as Critical - 8.6 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:2437 to address this issue and obtain more information.

    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    RHSA-2021:2437 Red Hat Enterprise Linux CoreOS URL Logo access.redhat.com/errata/RHSA-2021:2437