RHEL 8 has shipped on 22 March 2023 "openssl" security update RHSA with fix for "Important" CVE = RHSA-2023:1405 - Security Advisory == https://access.redhat.com/errata/RHSA-2023:1405 = CVEs == https://access.redhat.com/security/cve/CVE-2023-0286 == https://access.redhat.com/security/cve/CVE-2023-0215 == https://access.redhat.com/security/cve/CVE-2022-4450 == https://access.redhat.com/security/cve/CVE-2022-4304 = RPM Errata == https://errata.devel.redhat.com/advisory/109716 = Updated build with CVE fix == openssl-1.1.1k-9.el8_7 ODF 4.11 Container images are impacted by the CVE, and needs re-spin to include the updated packages. Being "Important" CVE, the number of days to ship the Container images with fixes is 30 days after fixes have been shipped at RHEL. So the mandatory due date to ship the ODF 4.11 Container images with updated packages is 22 April 2023, to prevent CHI scores (Health Score) from dropping to grade C.
Verifiedith OCP 4.11.0-0.nightly-2023-04-05-140612 and OCS operator4.11.7-18 following openssl version is updated for below images Ceph CSI openssl-1.1.1k-9.el8_7.x86_64 Rook Ceph Operator openssl-1.1.1k-9.el8_7.x86_64 noobaa core openssl-1.1.1k-9.el8_7.x86_64 rook ceph tools openssl-1.1.1k-9.el8_7.x86_64 csi rbd plugin openssl-1.1.1k-9.el8_7.x86_64
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Important: Red Hat OpenShift Data Foundation 4.11.7 Bug Fix and security update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2023:2023