RHEL 8 has shipped on 28 March 2022 "openssl" security update RHSA with fix for "Important" CVE = RHSA-2022:1065 - Security Advisory == https://access.redhat.com/errata/RHSA-2022:1065 = CVE-2022-0778 == https://access.redhat.com/security/cve/CVE-2022-0778 = RPM Errata == https://errata.devel.redhat.com/advisory/92286 = Updated builds with fixes for CVE == openssl-1.1.1k-6.el8_5 = Impacted packages at OCS 4.7 Container images == openssl-1.1.1k-5.el8_5 == openssl-libs-1.1.1k-5.el8_5 Six OCS 4.7 Container images are impacted by the CVE, and needs re-spin to include the updated packages. Being "Important" CVE, the number of days to ship the Container images with fixes is 30 days after fixes have been shipped at RHEL. So the mandatory due date to ship the OCS 4.7 Container images with updated packages is 26 April 2022, to prevent CHI scores (Health Score) from dropping to grade C. = Impacted OCS 4.7 Container images (6) == OpenShift Container Storage Operator (ocs4/ocs-rhel8-operator) === https://catalog.redhat.com/software/containers/ocs4/ocs-rhel8-operator/5ddef0f4d70cc51644a481f7 == Ceph CSI (ocs4/cephcsi-rhel8) === https://catalog.redhat.com/software/containers/ocs4/cephcsi-rhel8/5ddeeeaabed8bd164a0afa64 == Rook Ceph Operator (ocs4/rook-ceph-rhel8-operator) === https://catalog.redhat.com/software/containers/ocs4/rook-ceph-rhel8-operator/5ddef2a7bed8bd164a0afd90 == Multi-Cloud Object Gateway core container (ocs4/mcg-core-rhel8) === https://catalog.redhat.com/software/containers/ocs4/mcg-core-rhel8/5ddef5fb5a13461646f7f45e == Multi-Cloud Object Gateway operator (ocs4/mcg-rhel8-operator) === https://catalog.redhat.com/software/containers/ocs4/mcg-rhel8-operator/5ddbcefbdd19c71643b56ce9 == Must Gather for OpenShift Container Storage (ocs4/ocs-must-gather-rhel8) === https://catalog.redhat.com/software/containers/ocs4/ocs-must-gather-rhel8/5ddef0005a13461646f7f364
Verified with ocp cluster 4.7.0-0.nightly-2022-04-20-233440, ceph version 14.2.11-208.el8cp and ocs-operator.v4.7.10 ocs-operator-dd9dd9599-2r5fw sh-4.4$ rpm -qa|grep openssl openssl-1.1.1k-6.el8_5.x86_64 openssl-libs-1.1.1k-6.el8_5.x86_64 must-gather-79bs8-helper sh-4.4# rpm -qa|grep openssl openssl-1.1.1k-6.el8_5.x86_64 openssl-libs-1.1.1k-6.el8_5.x86_64 noobaa-operator-84488d87d9-477np sh-4.4$ rpm -qa|grep openssl openssl-1.1.1k-6.el8_5.x86_64 openssl-libs-1.1.1k-6.el8_5.x86_64 rook-ceph-operator-5cb8b89fff-svndv sh-4.4$ rpm -qa|grep openssl openssl-1.1.1k-6.el8_5.x86_64 openssl-libs-1.1.1k-6.el8_5.x86_64 noobaa-core-0 sh-4.4$ rpm -qa|grep openssl openssl-1.1.1k-6.el8_5.x86_64 openssl-libs-1.1.1k-6.el8_5.x86_64 csi-cephfsplugin-nblqp sh-4.4# rpm -qa|grep openssl openssl-libs-1.1.1k-6.el8_5.x86_64 openssl-1.1.1k-6.el8_5.x86_64 Closing the bug as updated builds with fixes for CVEs are displayed.
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Red Hat OpenShift Container Storage 4.7.10 bug fix update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2022:1534