{"id":"RHSA-2022:0055","summary":"Red Hat Security Advisory: OpenShift Container Platform 4.10.3 bug fix and security update","modified":"2026-03-27T10:03:12Z","published":"2024-09-30T14:19:01Z","upstream":["CVE-2014-3577","CVE-2021-21684","CVE-2021-41190","CVE-2021-41772","CVE-2021-44716","CVE-2021-44717","CVE-2022-0532"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2022:0055"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1129074"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2011949"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2024938"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2030801"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2030806"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2051730"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0055.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2014-3577"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2014-3577"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3577"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-21684"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-21684"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-21684"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2021-10-06/#SECURITY-2499"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-41190"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-41190"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-41190"},{"type":"ARTICLE","url":"https://github.com/moby/moby/security/advisories/GHSA-xmmx-7jpf-fx42"},{"type":"ARTICLE","url":"https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m"},{"type":"ARTICLE","url":"https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-41772"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2020736"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-41772"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-41772"},{"type":"ARTICLE","url":"https://groups.google.com/g/golang-announce/c/0fM21h43arc"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-44716"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-44716"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44716"},{"type":"ARTICLE","url":"https://groups.google.com/g/golang-announce/c/hcmEScgc00k"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-44717"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-44717"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44717"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0532"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-0532"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0532"},{"type":"ARTICLE","url":"https://github.com/cri-o/cri-o/security/advisories/GHSA-w2j5-3rcx-vx7x"},{"type":"ARTICLE","url":"https://kubernetes.io/docs/tasks/administer-cluster/sysctl-cluster/#enabling-unsafe-sysctls"}],"affected":[{"package":{"name":"jenkins","ecosystem":"Red Hat:openshift:4.10::el8","purl":"pkg:rpm/redhat/jenkins"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.319.2.1643288987-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0055.json"}},{"package":{"name":"jenkins-2-plugins","ecosystem":"Red Hat:openshift:4.10::el8","purl":"pkg:rpm/redhat/jenkins-2-plugins"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.10.1643404185-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0055.json"}},{"package":{"name":"cri-o","ecosystem":"Red Hat:openshift:4.10::el7","purl":"pkg:rpm/redhat/cri-o"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.23.0-92.rhaos4.10.gitdaab4d1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0055.json"}},{"package":{"name":"cri-o-debuginfo","ecosystem":"Red Hat:openshift:4.10::el7","purl":"pkg:rpm/redhat/cri-o-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.23.0-92.rhaos4.10.gitdaab4d1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0055.json"}},{"package":{"name":"cri-o","ecosystem":"Red Hat:openshift:4.10::el8","purl":"pkg:rpm/redhat/cri-o"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.23.1-9.rhaos4.10.gitbdffb9a.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0055.json"}},{"package":{"name":"cri-o-debuginfo","ecosystem":"Red Hat:openshift:4.10::el8","purl":"pkg:rpm/redhat/cri-o-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.23.1-9.rhaos4.10.gitbdffb9a.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0055.json"}},{"package":{"name":"cri-o-debugsource","ecosystem":"Red Hat:openshift:4.10::el8","purl":"pkg:rpm/redhat/cri-o-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.23.1-9.rhaos4.10.gitbdffb9a.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0055.json"}},{"package":{"name":"openshift","ecosystem":"Red Hat:openshift:4.10::el7","purl":"pkg:rpm/redhat/openshift"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.10.0-202202250816.p0.ge419edf.assembly.stream.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0055.json"}},{"package":{"name":"openshift-clients","ecosystem":"Red Hat:openshift:4.10::el7","purl":"pkg:rpm/redhat/openshift-clients"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.10.0-202202160023.p0.gf93da17.assembly.stream.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0055.json"}},{"package":{"name":"openshift-clients-redistributable","ecosystem":"Red Hat:openshift:4.10::el7","purl":"pkg:rpm/redhat/openshift-clients-redistributable"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.10.0-202202160023.p0.gf93da17.assembly.stream.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0055.json"}},{"package":{"name":"openshift-hyperkube","ecosystem":"Red Hat:openshift:4.10::el7","purl":"pkg:rpm/redhat/openshift-hyperkube"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.10.0-202202250816.p0.ge419edf.assembly.stream.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0055.json"}},{"package":{"name":"openshift","ecosystem":"Red Hat:openshift:4.10::el8","purl":"pkg:rpm/redhat/openshift"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.10.0-202202250816.p0.ge419edf.assembly.stream.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0055.json"}},{"package":{"name":"openshift-clients","ecosystem":"Red Hat:openshift:4.10::el8","purl":"pkg:rpm/redhat/openshift-clients"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.10.0-202202160023.p0.gf93da17.assembly.stream.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0055.json"}},{"package":{"name":"openshift-clients-redistributable","ecosystem":"Red Hat:openshift:4.10::el8","purl":"pkg:rpm/redhat/openshift-clients-redistributable"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.10.0-202202160023.p0.gf93da17.assembly.stream.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0055.json"}},{"package":{"name":"openshift-hyperkube","ecosystem":"Red Hat:openshift:4.10::el8","purl":"pkg:rpm/redhat/openshift-hyperkube"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.10.0-202202250816.p0.ge419edf.assembly.stream.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0055.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}