Bug 2070513

Summary: Include at ODF 4.9 container images (10) the RHEL8 CVE fix on "openssl"
Product: [Red Hat Storage] Red Hat OpenShift Data Foundation Reporter: Rejy M Cyriac <rcyriac>
Component: distributionAssignee: Tamil <tmuthami>
Status: CLOSED ERRATA QA Contact: Joy John Pinto <jopinto>
Severity: high Docs Contact:
Priority: high    
Version: 4.9CC: aeyal, bniver, jopinto, kramdoss, madam, muagarwa, ocs-bugs, odf-bz-bot, sheggodu, sostapov, ykaul
Target Milestone: ---Keywords: ZStream
Target Release: ODF 4.9.6   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-04-25 08:29:08 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Rejy M Cyriac 2022-03-31 10:30:44 UTC
RHEL 8 has shipped on 28 March 2022 "openssl" security update RHSA with fix for "Important" CVE


= RHSA-2022:1065 - Security Advisory
  == https://access.redhat.com/errata/RHSA-2022:1065


= CVE-2022-0778
  == https://access.redhat.com/security/cve/CVE-2022-0778



= RPM Errata
  == https://errata.devel.redhat.com/advisory/92286

= Updated builds with fixes for CVE
  == openssl-1.1.1k-6.el8_5


= Impacted packages at ODF 4.9 Container images
  == openssl-1.1.1k-5.el8_5
  == openssl-libs-1.1.1k-5.el8_5



Ten ODF 4.9 Container images are impacted by the CVE, and needs re-spin to include the updated packages.

Being "Important" CVE, the number of days to ship the Container images with fixes is 30 days after fixes have been shipped at RHEL. So the mandatory due date to ship the ODF 4.9 Container images with updated packages is 26 April 2022, to prevent CHI scores (Health Score) from dropping to grade C.


= Impacted ODF 4.9 Container images (10)

  == OpenShift Data Foundation Operator (odf4/odf-rhel8-operator)
     === https://catalog.redhat.com/software/containers/odf4/odf-rhel8-operator/612535caeb34b73652493062

  == OpenShift Container Storage Operator (odf4/ocs-rhel8-operator)
     === https://catalog.redhat.com/software/containers/odf4/ocs-rhel8-operator/612f4c2e7b37b351c172d00b

  == Ceph Container Storage Interface (odf4/cephcsi-rhel8)
     === https://catalog.redhat.com/software/containers/odf4/cephcsi-rhel8/61153a826e1e42ca4d6defe2

  == Rook Ceph Operator (odf4/rook-ceph-rhel8-operator)
     === https://catalog.redhat.com/software/containers/odf4/rook-ceph-rhel8-operator/612546e7dece23122b7a7cac

  == Multi-Cloud Object Gateway Core (odf4/mcg-core-rhel8)
     === https://catalog.redhat.com/software/containers/odf4/mcg-core-rhel8/61254a9cdece23122b7a7cad

  == Multi-Cloud Object Gateway Operator (odf4/mcg-rhel8-operator)
     === https://catalog.redhat.com/software/containers/odf4/mcg-rhel8-operator/61254b55bd674341b5c5f471

  == OpenShift Data Foundation Must Gather (odf4/ocs-must-gather-rhel8)
     === https://catalog.redhat.com/software/containers/odf4/ocs-must-gather-rhel8/614cda2c69cb9f1af5ba6ad3

  == OpenShift Data Foundation Console (odf4/odf-console-rhel8)
     === https://catalog.redhat.com/software/containers/odf4/odf-console-rhel8/612f5bad539c8cedbde1cd56
     
  == OpenShift Data Foundation Disaster Recovery Operator (odf4/odr-rhel8-operator)
     === https://catalog.redhat.com/software/containers/odf4/odr-rhel8-operator/612555acdece23122b7a7cae
     
  == Volume Replication Operator (odf4/volume-replication-rhel8-operator)
     === https://catalog.redhat.com/software/containers/odf4/volume-replication-rhel8-operator/61254940bd674341b5c5f470

Comment 7 Joy John Pinto 2022-04-19 07:21:03 UTC
Verified with ocp cluster 4.9.0-0.nightly-2022-04-14-125839, ceph version 16.2.0-152.el8cp and OCS 4.9.6

csi-cephfsplugin-provisioner-7cc4d4599c-6dppw
sh-4.4$ rpm -qa|grep openssl
openssl-libs-1.1.1k-6.el8_5.x86_64
openssl-1.1.1k-6.el8_5.x86_64

ocs-operator-7ddfb79454-lmp5s
sh-4.4$ rpm -qa|grep openssl
openssl-libs-1.1.1k-6.el8_5.x86_64

odf-operator-controller-manager-5ddc757945-rkjds
sh-4.4$ rpm -qa|grep openssl
openssl-libs-1.1.1k-6.el8_5.x86_64

rook-ceph-operator-7ccc855cd4-smbsn
sh-4.4$ rpm -qa|grep openssl
openssl-1.1.1k-6.el8_5.x86_64
openssl-libs-1.1.1k-6.el8_5.x86_64


noobaa-operator-74b979d79f-twpjp
sh-4.4$ rpm -qa|grep openssl
openssl-libs-1.1.1k-6.el8_5.x86_64

noobaa-core-0
sh-4.4$ rpm -qa|grep openssl
openssl-libs-1.1.1k-6.el8_5.x86_64
openssl-1.1.1k-6.el8_5.x86_64

odf-console-648b684b8d-sfrnr
sh-4.4$ rpm -qa|grep openssl
openssl-libs-1.1.1k-6.el8_5.x86_64
openssl-1.1.1k-6.el8_5.x86_64

must-gather-w5rvq-helper
sh-4.4# rpm -qa|grep openssl
openssl-1.1.1k-6.el8_5.x86_64
openssl-libs-1.1.1k-6.el8_5.x86_64

"OpenShift Data Foundation Disaster Recovery Operator" and "Volume Replication Operator" come with openshift DR, which is not part of automation yet. Hence apart from those two containers rest of the pods are verified for fixes.

Closing the bug as updated builds with fixes for CVEs are displayed.

Comment 12 errata-xmlrpc 2022-04-25 08:29:08 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Red Hat OpenShift Data Foundation 4.9.6 Bug Fix Update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2022:1517