RedHat: RHSA-2023-1170:01 Important: Red Hat OpenShift Data Foundation
Summary
Red Hat OpenShift Data Foundation is software-defined storage integrated
with and optimized for the Red Hat OpenShift Data Foundation. Red Hat
OpenShift Data Foundation is a highly scalable, production-grade persistent
storage for stateful applications running in the Red Hat OpenShift
Container Platform. In addition to persistent storage, Red Hat OpenShift
Data Foundation provisions a multicloud data management service with an S3
compatible API.
Security Fix:
* goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as
random as they should be (CVE-2021-4238)
For more details about the security issues, including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
pages listed in the References section.
Bug fixes:
* Previously, wrong and unclear error messages were displayed on
Failover/Relocate modal. With this fix, appropriate error messages with
links to documentation is added to most of the error messages. (BZ#2161903)
* With this update, the read operations performance of the Multicloud
Object Gateway database is improved. To achieve this, a certain regular
expressions that are used by some of the queries that run against the
database to serve the required data are pre-compiled. This saves time when
run in real-time. (BZ#2149861)
* Previously, the default container created in Azure was with public access
enabled. With this fix, the default container created will not have the
public access enabled which means `AllowBlobPublicAccess` is set to false.
(BZ#2168838)
* With this update, the `multicluster-orchestrator` operator is listed
under the operators supporting disconnected mode installations. To list
this operator, the disconnected mode support annotation is added to CSV as
the user interface (UI) uses this annotation. (BZ#2166223)
All users of Red Hat OpenShift Data Foundation are advised to upgrade to
these updated images, which provide these bug fixes.
Summary
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
References
https://access.redhat.com/security/cve/CVE-2020-10735 https://access.redhat.com/security/cve/CVE-2021-4238 https://access.redhat.com/security/cve/CVE-2021-28861 https://access.redhat.com/security/cve/CVE-2022-3650 https://access.redhat.com/security/cve/CVE-2022-4415 https://access.redhat.com/security/cve/CVE-2022-40897 https://access.redhat.com/security/cve/CVE-2022-45061 https://access.redhat.com/security/cve/CVE-2022-47629 https://access.redhat.com/security/updates/classification/#important
Package List
Topic
Red Hat OpenShift Data Foundation 4.12.1 Bug Fix UpdateRed Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.
Topic
Relevant Releases Architectures
Bugs Fixed
2123501 - [RDR] Pod stuck due to error "applyFSGroup failed for vol" for a PVC that was relocated
2156729 - CVE-2021-4238 goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be
2159466 - [MDR RDR] Application user unable to invoke Failover and Relocate actions
2161652 - Namespace store fails to get created via the ODF UI
2165493 - [MCG] Azure bs/ns creation fails with target bucket does not exists
2165960 - [4.12.z clone] ocs-operator CSV is missing disconnected env annotation.
2166220 - [RFE] ODF bluewash introduction in 4.12.x
2166223 - CSV is missing disconnected env annotation and relatedImages spec
2167301 - [RFE] ODF bluewash introduction in 4.12.x
2167950 - CSV is missing disconnected env annotation and relatedImages spec
2168637 - fix redirect link to operator details page (OCS dashboard)
2170106 - Update to RHCS 5.3z1 Ceph container image at ODF-4.12.1
2170449 - Include at ODF 4.12 container images the RHEL8 CVE fix on "libksba"