{"id":"RHSA-2021:0429","summary":"Red Hat Security Advisory: OpenShift Container Platform 4.5.33 packages and security update","modified":"2026-02-26T10:03:18Z","published":"2024-09-16T05:24:17Z","upstream":["CVE-2020-11979","CVE-2020-1945","CVE-2021-21602","CVE-2021-21603","CVE-2021-21604","CVE-2021-21605","CVE-2021-21606","CVE-2021-21607","CVE-2021-21608","CVE-2021-21609","CVE-2021-21610","CVE-2021-21611","CVE-2021-21615"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2021:0429"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1837444"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1903702"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1921322"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1925140"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1925141"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1925143"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1925145"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1925151"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1925156"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1925157"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1925159"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1925160"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1925161"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1925678"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0429.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-1945"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-1945"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-1945"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-11979"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-11979"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11979"},{"type":"ARTICLE","url":"https://security.gentoo.org/glsa/202011-18"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-21602"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-21602"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-21602"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-21603"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-21603"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-21603"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-21604"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-21604"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-21604"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-21605"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-21605"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-21605"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-21606"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-21606"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-21606"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-21607"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-21607"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-21607"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-21608"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-21608"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-21608"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-21609"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-21609"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-21609"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-21610"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-21610"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-21610"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-21611"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-21611"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-21611"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-21615"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-21615"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-21615"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2021-01-26/#SECURITY-2197"}],"affected":[{"package":{"name":"conmon","ecosystem":"Red Hat:openshift:4.5::el7","purl":"pkg:rpm/redhat/conmon"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:2.0.21-1.rhaos4.5.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:0429.json"}},{"package":{"name":"jenkins","ecosystem":"Red Hat:openshift:4.5::el7","purl":"pkg:rpm/redhat/jenkins"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.263.3.1612434332-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:0429.json"}},{"package":{"name":"openshift","ecosystem":"Red Hat:openshift:4.5::el7","purl":"pkg:rpm/redhat/openshift"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.5.0-202102050524.p0.git.0.9229406.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:0429.json"}},{"package":{"name":"openshift-ansible","ecosystem":"Red Hat:openshift:4.5::el7","purl":"pkg:rpm/redhat/openshift-ansible"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.5.0-202102031005.p0.git.0.c6839a2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:0429.json"}},{"package":{"name":"openshift-ansible-test","ecosystem":"Red Hat:openshift:4.5::el7","purl":"pkg:rpm/redhat/openshift-ansible-test"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.5.0-202102031005.p0.git.0.c6839a2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:0429.json"}},{"package":{"name":"openshift-clients","ecosystem":"Red Hat:openshift:4.5::el7","purl":"pkg:rpm/redhat/openshift-clients"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.5.0-202102051529.p0.git.3612.61b096a.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:0429.json"}},{"package":{"name":"openshift-clients-redistributable","ecosystem":"Red Hat:openshift:4.5::el7","purl":"pkg:rpm/redhat/openshift-clients-redistributable"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.5.0-202102051529.p0.git.3612.61b096a.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:0429.json"}},{"package":{"name":"openshift-hyperkube","ecosystem":"Red Hat:openshift:4.5::el7","purl":"pkg:rpm/redhat/openshift-hyperkube"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.5.0-202102050524.p0.git.0.9229406.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:0429.json"}},{"package":{"name":"conmon","ecosystem":"Red Hat:openshift:4.5::el8","purl":"pkg:rpm/redhat/conmon"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:2.0.21-1.rhaos4.5.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:0429.json"}},{"package":{"name":"machine-config-daemon","ecosystem":"Red Hat:openshift:4.5::el8","purl":"pkg:rpm/redhat/machine-config-daemon"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.5.0-202102050524.p0.git.2594.ff3b8c0.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:0429.json"}},{"package":{"name":"openshift","ecosystem":"Red Hat:openshift:4.5::el8","purl":"pkg:rpm/redhat/openshift"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.5.0-202102050524.p0.git.0.9229406.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:0429.json"}},{"package":{"name":"openshift-clients","ecosystem":"Red Hat:openshift:4.5::el8","purl":"pkg:rpm/redhat/openshift-clients"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.5.0-202102051529.p0.git.3612.61b096a.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:0429.json"}},{"package":{"name":"openshift-clients-redistributable","ecosystem":"Red Hat:openshift:4.5::el8","purl":"pkg:rpm/redhat/openshift-clients-redistributable"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.5.0-202102051529.p0.git.3612.61b096a.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:0429.json"}},{"package":{"name":"openshift-hyperkube","ecosystem":"Red Hat:openshift:4.5::el8","purl":"pkg:rpm/redhat/openshift-hyperkube"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.5.0-202102050524.p0.git.0.9229406.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:0429.json"}},{"package":{"name":"runc","ecosystem":"Red Hat:openshift:4.5::el8","purl":"pkg:rpm/redhat/runc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.0-72.rhaos4.5.giteadfc6b.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:0429.json"}},{"package":{"name":"runc-debuginfo","ecosystem":"Red Hat:openshift:4.5::el8","purl":"pkg:rpm/redhat/runc-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.0-72.rhaos4.5.giteadfc6b.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:0429.json"}},{"package":{"name":"runc-debugsource","ecosystem":"Red Hat:openshift:4.5::el8","purl":"pkg:rpm/redhat/runc-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.0-72.rhaos4.5.giteadfc6b.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:0429.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"}]}