Skip to content

Instantly share code, notes, and snippets.

@shaneboulden
Created May 3, 2023 05:25
Show Gist options
  • Save shaneboulden/8b49ab24eacd5d753c0db3ae3a00870a to your computer and use it in GitHub Desktop.
Save shaneboulden/8b49ab24eacd5d753c0db3ae3a00870a to your computer and use it in GitHub Desktop.
Quay Container Security Operator output
oc get vuln --all-namespaces
NAMESPACE NAME AGE
openshift-addon-operator sha256.568dca2e685ef0725703c389154bbc15b6c842ea016bb4be9d7c43fbc37102ef 84m
openshift-addon-operator sha256.baedb268ac66456018fb30af395bb3d69af5fff3252ff5d549f0231b1ebb6901 84m
openshift-addon-operator sha256.f67d69aa6281411d0e4c9d59e1973e28a8a35a414a5fbbccfef11b40e7f31a2d 84m
openshift-apiserver-operator sha256.36635ca93cae2396f15444c45ff27e07a3ee3f800c2a582e63874f104e6cf4ce 82m
openshift-apiserver sha256.0fb1dd2851c75894d0fe3240c3b1f99231c468f56bd7d4e894ad1cf9a40fe6ab 82m
openshift-apiserver sha256.1f61e726390f9ef5f5a77ccc8c4d7b1686cdf4faebc2eb5e1eeefa51241df32c 82m
openshift-authentication-operator sha256.85a4a2ca225bbef5509cd020c322826fc93d99e7ebb768dad6c28bb5f1f0e8d3 80m
openshift-authentication sha256.ab3a5ef78441be9f06f8570baa1aa418f91c2ac7a0e4d3fe76e5d222264e24ff 80m
openshift-cloud-controller-manager-operator sha256.da70e365542d4e5451ea0c1bd0c9b89be7d831faa073639ce554849fcccc934f 82m
openshift-cloud-credential-operator sha256.77476b5bbc5457a63663f2cc89e75bce777899731edced2d01f0ebde1ed1dfde 80m
openshift-cloud-credential-operator sha256.b5fb8d9b5c4b415bc7749554c9b518a0d6e2d86516ff770b08b202bacea967c6 80m
openshift-cloud-credential-operator sha256.ffbccd590dcfe4400aa218659618a453e237951662ffb9ccab96d56156a9b31f 80m
openshift-cloud-network-config-controller sha256.bcccb5d19122cdb424cc2d005a18285e5d9942d907b1af08faa29afb6561c2b4 82m
openshift-cluster-csi-drivers sha256.1cc27acf025129ba49eaa07c466fa7d66b435e5ee2788459c6ad366ffba0e739 83m
openshift-cluster-csi-drivers sha256.3d72b11a6bc4efbcad2bda5c692b1013d4922ac81b828153395aff336c57b5b0 83m
openshift-cluster-csi-drivers sha256.543c476b5ab938c3901d716ee2b80d3297c60963f5db2dd8349626380d9a3626 83m
openshift-cluster-csi-drivers sha256.6915ca4859a1f7bc7600fcfe8daeb2c3f4f6dc689bc4215c6fcb210355e44d60 81m
openshift-cluster-csi-drivers sha256.b6ffae89d0b3b801d5e84c3326a0baeb8de491b3cd4559075c5257b2847df2b2 83m
openshift-cluster-csi-drivers sha256.bf51c44c3e74e41905bf999a506270f12c1223941195d21f8accad8039e0ede9 83m
openshift-cluster-csi-drivers sha256.dedf1b125b7a5c8eef8ec37d231c5146ac10d15c91663fec04d49414ad5394fc 83m
openshift-cluster-csi-drivers sha256.fae64db69f0d08d71e9ee1d44d7ff1dfb315d6d1201aa9b6942ea8fb8d744aac 83m
openshift-cluster-csi-drivers sha256.ffbccd590dcfe4400aa218659618a453e237951662ffb9ccab96d56156a9b31f 84m
openshift-cluster-machine-approver sha256.4c0558c6cea9d0eb6a61aaa2f8f6db65b49b80b594e73dd94610eb36705bc677 83m
openshift-cluster-machine-approver sha256.ffbccd590dcfe4400aa218659618a453e237951662ffb9ccab96d56156a9b31f 83m
openshift-cluster-node-tuning-operator sha256.1d5496486c05b10a4ab2d9f3ff89945005eb260a3081b67449b937050de27070 84m
openshift-cluster-samples-operator sha256.1a209cfa61f070cb781255f6b57f4c7788706f2b4d61d7f2a854070c8f43c074 80m
openshift-cluster-storage-operator sha256.00edcfebbe259dd67b37487972850061829e9f513e2fa6ad921c9a760d7ccc75 82m
openshift-cluster-storage-operator sha256.5b37c747e679a1423ad98e850e18c3b4f08c3cd95dd37339ed9bae05f5e8d30a 83m
openshift-cluster-storage-operator sha256.794a37b6f8c7c7df00e6e18f22f60a952b3fe12d2f1f1d19c45973978f3590fb 83m
openshift-cluster-storage-operator sha256.ce91cf24be031b27459919f56e6d21b2d06bc3401966466630721aa5b4d6db92 82m
openshift-cluster-version sha256.b9d6ccb5ba5a878141e468e56fa62912ad7c04864acfec0c0056d2b41e3259cc 81m
openshift-config-operator sha256.426ee4d32e9bc19a5b7522cc06908b7f1a14b90410924ea4f24d0c189c06f3c0 82m
openshift-console-operator sha256.314c7a79fd217a380905c65cefbc5451b47d8a1cf2c0111150ed24baddd913c3 81m
openshift-console sha256.7bfa750d43225e8539b4c15511b7b943fcc244e7802bf907983416430dc5b9ee 83m
openshift-console sha256.ee45434f6223cf71eab1c19cbdd739adaa04aa2b0f033e2db48480060cf84a2f 83m
openshift-controller-manager-operator sha256.00c72a08082b831ef35713c2feb3ff6e65ff1fa5250af35dd03d9a0d4f915723 81m
openshift-controller-manager sha256.b963214f14897cb4b880d45165a13955c11f263ff47aeefb8bec71e2b71be406 82m
openshift-custom-domains-operator sha256.1af868a6e39a5e8c7ac0e0b3b5041331131ceaa743420a07e6588e9296debf7b 81m
openshift-deployment-validation-operator sha256.0391f724ce3bf0c9ae74853af3782de050f56cb7ae512da801cc4f680e8949db 82m
openshift-dns-operator sha256.f2a50c562ed8eef2af4d08c070e0791fb59dbb6216e94e9b97581a8124a185f9 84m
openshift-dns-operator sha256.ffbccd590dcfe4400aa218659618a453e237951662ffb9ccab96d56156a9b31f 84m
openshift-dns sha256.47c928cdb55f80cb2c2556e798e3b67247bc2da631c82df7c04ed2bd1715ec25 83m
openshift-dns sha256.675d4d6225f3427946e5feeb7636dbde3fbb6c4bc2e88172bc3ae5c630cbd511 83m
openshift-dns sha256.ffbccd590dcfe4400aa218659618a453e237951662ffb9ccab96d56156a9b31f 83m
openshift-etcd-operator sha256.f89377de600ac9ecd33c72245a49758c179d9fbd13548350b6c98a94bf7f4884 81m
openshift-etcd sha256.d975625ecd0fd64d07d0c68f25057f296f8867f1467e22cf3b05acc2ad839dc9 82m
openshift-etcd sha256.f89377de600ac9ecd33c72245a49758c179d9fbd13548350b6c98a94bf7f4884 83m
openshift-image-registry sha256.4ae98763aa611bf0fbbc194f5186959fb1a3bdf29bb0701a9ec4f5b9553f7cb2 81m
openshift-image-registry sha256.fa3984c16493679d3bea63de9b585df7a3dc3596c9a5106ec5118069c7f6b593 83m
openshift-ingress-canary sha256.de8ebeefa4658664f0659a976124f882cc6356590625280f691eee012bd5396a 82m
openshift-ingress-operator sha256.de8ebeefa4658664f0659a976124f882cc6356590625280f691eee012bd5396a 83m
openshift-ingress-operator sha256.ffbccd590dcfe4400aa218659618a453e237951662ffb9ccab96d56156a9b31f 83m
openshift-ingress sha256.455f14c36eb6b5d51c515d844053357a53839262c75023a32a2280be97301fe4 81m
openshift-insights sha256.b38843c20d08068783c0d9b3f11f98871e27eb5e1a69c3f64d7af0ee0c69dd13 83m
openshift-kube-apiserver-operator sha256.0fb1dd2851c75894d0fe3240c3b1f99231c468f56bd7d4e894ad1cf9a40fe6ab 83m
openshift-kube-apiserver sha256.0fb1dd2851c75894d0fe3240c3b1f99231c468f56bd7d4e894ad1cf9a40fe6ab 81m
openshift-kube-apiserver sha256.d221830708e0cd86af4faf64ca28a6a4d431edc659ce39632a94dc33f86520af 81m
openshift-kube-controller-manager-operator sha256.d33b9b0cdcaed452faa5c5ff272577c5884e047d2702e67bd1a1e59be70d0b19 82m
openshift-kube-scheduler-operator sha256.8b124b5da734882998aeb03f683bf7d82bbff19f699d14058ab39009cab28bc3 81m
openshift-kube-storage-version-migrator-operator sha256.e57a21e45982200ed54e1e55878ce7d2cc776aefb48f3e57db2ed6992b1e3dc9 81m
openshift-kube-storage-version-migrator sha256.4e71cc0f1a79adfc25ff1549ce24d5cec48d074b63a73634e01da93c5a00c9e9 81m
openshift-machine-api sha256.49e5a07bc5ea22f283774545c5c5f87b0cd6f03e20f4de27cc3aab78f9fdfd5f 82m
openshift-machine-api sha256.ad558842f900c6f7333291efd1b76927bcd394cec89d44533ab4119e71e29d3c 81m
openshift-machine-api sha256.d6e9d22471b90aa55657253c1ca5c97ff8668980f13a20014f4c10e76e92a04e 83m
openshift-machine-api sha256.d7b23b95aadc88016d6f8d9497cbcab009af24d1626e794c2ef07582d699c236 81m
openshift-machine-api sha256.fdbedb5411b60f42a4496c293fcd600b05e5d26f1517bc1753d73c345ee63c8c 83m
openshift-machine-api sha256.ffbccd590dcfe4400aa218659618a453e237951662ffb9ccab96d56156a9b31f 83m
openshift-machine-config-operator sha256.49affb19635777cf255b74605900210105b724692d0936e6d6d73c9f8c875a32 82m
openshift-machine-config-operator sha256.7c1c281dd127f390fc2377e8d739ca583fdd0d6aaa6d41c55d9171fcbf61f53f 83m
openshift-managed-node-metadata-operator sha256.3cec99dcbc2c716d97b3bdaa4088a652ca567dbe41336bab78eb5b49a0f8126f 82m
openshift-marketplace sha256.4871bfc67f319136bce9d1a64778505b243bbd3f638c61b5138d881c6e7549e0 82m
openshift-monitoring sha256.012458d3d79fdfc744338722fe75d2553ecbf1fa9cc050dd0830696569a0ba36 84m
openshift-monitoring sha256.1848386719cc0afcddd67d5117beb55081ea2ba473dedb55d8c21d2d7bb82485 83m
openshift-monitoring sha256.2cfea2d4855cb5461b312ade2752439d099a00413b7c023438159f71a1265365 81m
openshift-monitoring sha256.3662a32999dcf34b8ec2626b18d13e93680b3d11fd74b50d3d13e91cebc75d2a 84m
openshift-monitoring sha256.40b1732fbbb43e269a0beb38f80b2692ae2f85a795ca8ab85d627210b3c38178 83m
openshift-monitoring sha256.49affb19635777cf255b74605900210105b724692d0936e6d6d73c9f8c875a32 84m
openshift-monitoring sha256.4e62e7ab86e7493d1bc1dec9b2f824d82be25fbd869fa2648e807d6fa58fd371 83m
openshift-monitoring sha256.6ce9b80cd1d907cb6c9ed2a18612f386f7503257772d1d88155a4a2e6773fd00 81m
openshift-monitoring sha256.6db08be93d81d7d37e2abe44a2e431e2591b71e31adea5ea98d053ea3a0ad4d3 83m
openshift-monitoring sha256.71dd3bdcf8258ab466bb46ac264785b139eb43ce139e93b442fc60cd674b793b 82m
openshift-monitoring sha256.97ffae63353c694fe66615679429351a96711cbdeb400555181dea8688a388ea 83m
openshift-monitoring sha256.a4bf6e28f9deed8a0621f24d2141b76b0f3cbcc393f64edb09fd2d116351c727 80m
openshift-monitoring sha256.b9945426d22a0113f678cdd0f73d3674bcbb564ce2bdb90af213bdca78c87ca0 83m
openshift-monitoring sha256.c3550f290ef612d1a51d96bfa23504df456f936753abfe8ae6d17e4c0814c739 84m
openshift-monitoring sha256.dd5ed598424eea2089f125b33fa9cf8309e4fdafc39d305106269ccf4beeba9a 84m
openshift-monitoring sha256.ea6ce9c62e9884538e0ac5370be6dceba9bfb92a7ca4a608fda5f678d6d6ca2d 82m
openshift-monitoring sha256.ffbccd590dcfe4400aa218659618a453e237951662ffb9ccab96d56156a9b31f 84m
openshift-multus sha256.10e893eacab85b7d767d5cbe8892e1cf2b7e276dc6dfb504b1c105c9935b1e7c 83m
openshift-multus sha256.cf587a0da813d64ed5b1a81c77bdfa2f0cda95ae4277b6584c5195651aac6918 83m
openshift-multus sha256.d5fa719ebe2e48774b532d9162263ba455b87bad0fd507a396a584d9ebad9018 84m
openshift-multus sha256.ffbccd590dcfe4400aa218659618a453e237951662ffb9ccab96d56156a9b31f 83m
openshift-must-gather-operator sha256.ef8443b2d24047024f8d700aebff0e5334bd5ed4a962eb48b21670d2a89321c3 83m
openshift-network-diagnostics sha256.505d3e8cafad466bc483ee8e9aa78814fce065372b0eb164731f64919881a6d0 84m
openshift-network-operator sha256.505d3e8cafad466bc483ee8e9aa78814fce065372b0eb164731f64919881a6d0 81m
openshift-oauth-apiserver sha256.e1fdf05052a722869dd254d00d26c113fa269d2ccb69c03329b06174a1a3095d 83m
openshift-operator-lifecycle-manager sha256.8d9a9ef64e567c1dc0a2cbf4fd257c6a2e2082f37d11467d112fe060e0654c25 83m
openshift-osd-metrics sha256.552de602a0053c6d887a26f6dee1c3c7fa03b9fd47d52b07a77905f6f88b05fb 82m
openshift-ovn-kubernetes sha256.7a0e7eaf0dce2977b9efe41475867ffacf85a02d6a09543d9be0532022201150 83m
openshift-ovn-kubernetes sha256.ffbccd590dcfe4400aa218659618a453e237951662ffb9ccab96d56156a9b31f 83m
openshift-route-controller-manager sha256.bdb7526832ecada22aad67a4e593d31d5a93887fa51845cd5dfe4f65cffb3214 82m
openshift-service-ca-operator sha256.b25d9d6cf2f69ef64952d4fb550a0d03641c23ba5375754789a92a72ca1d2bdd 83m
openshift-service-ca sha256.b25d9d6cf2f69ef64952d4fb550a0d03641c23ba5375754789a92a72ca1d2bdd 84m
openshift-user-workload-monitoring sha256.1848386719cc0afcddd67d5117beb55081ea2ba473dedb55d8c21d2d7bb82485 83m
openshift-user-workload-monitoring sha256.49affb19635777cf255b74605900210105b724692d0936e6d6d73c9f8c875a32 83m
openshift-user-workload-monitoring sha256.97ffae63353c694fe66615679429351a96711cbdeb400555181dea8688a388ea 83m
openshift-user-workload-monitoring sha256.a4bf6e28f9deed8a0621f24d2141b76b0f3cbcc393f64edb09fd2d116351c727 83m
openshift-user-workload-monitoring sha256.c3550f290ef612d1a51d96bfa23504df456f936753abfe8ae6d17e4c0814c739 83m
openshift-user-workload-monitoring sha256.ffbccd590dcfe4400aa218659618a453e237951662ffb9ccab96d56156a9b31f 83m
openshift-validation-webhook sha256.7de9471e986143badd9f75103104aad3715b9af96445d0b9a3c51c78adde161a 83m
openshift-velero sha256.b0eb496a906aa41c4897a5e9617cad98c06155af72c90c23ccde7d5a9ed0a3b5 84m
go run cmd/cve-analyser/main.go cves.csv
Processing the "cves.csv"...
CVE-2020-36242,openshift-release-dev/ocp-v4.0-art-dev@sha256:ffbccd590dcfe4400aa218659618a453e237951662ffb9ccab96d56156a9b31f,CVE Severity:Moderate,Not Found Any Information
oc describe vuln --namespace openshift-ovn-kubernetes sha256.7a0e7eaf0dce2977b9efe41475867ffacf85a02d6a09543d9be0532022201150
Name: sha256.7a0e7eaf0dce2977b9efe41475867ffacf85a02d6a09543d9be0532022201150
Namespace: openshift-ovn-kubernetes
Labels: openshift-ovn-kubernetes/ovnkube-master-8g5sv=true
openshift-ovn-kubernetes/ovnkube-master-9xxks=true
openshift-ovn-kubernetes/ovnkube-master-gtx28=true
openshift-ovn-kubernetes/ovnkube-node-bs2zx=true
openshift-ovn-kubernetes/ovnkube-node-fvkks=true
openshift-ovn-kubernetes/ovnkube-node-h26ms=true
openshift-ovn-kubernetes/ovnkube-node-h9rbh=true
openshift-ovn-kubernetes/ovnkube-node-k27xx=true
openshift-ovn-kubernetes/ovnkube-node-n88th=true
openshift-ovn-kubernetes/ovnkube-node-vb9nl=true
Annotations: <none>
API Version: secscan.quay.redhat.com/v1alpha1
Kind: ImageManifestVuln
Metadata:
Creation Timestamp: 2023-05-03T03:40:26Z
Generation: 2
Managed Fields:
API Version: secscan.quay.redhat.com/v1alpha1
Fields Type: FieldsV1
fieldsV1:
f:metadata:
f:labels:
.:
f:openshift-ovn-kubernetes/ovnkube-master-8g5sv:
f:openshift-ovn-kubernetes/ovnkube-master-9xxks:
f:openshift-ovn-kubernetes/ovnkube-master-gtx28:
f:openshift-ovn-kubernetes/ovnkube-node-bs2zx:
f:openshift-ovn-kubernetes/ovnkube-node-fvkks:
f:openshift-ovn-kubernetes/ovnkube-node-h26ms:
f:openshift-ovn-kubernetes/ovnkube-node-h9rbh:
f:openshift-ovn-kubernetes/ovnkube-node-k27xx:
f:openshift-ovn-kubernetes/ovnkube-node-n88th:
f:openshift-ovn-kubernetes/ovnkube-node-vb9nl:
f:spec:
.:
f:features:
f:image:
f:manifest:
Manager: security-labeller
Operation: Update
Time: 2023-05-03T04:40:36Z
API Version: secscan.quay.redhat.com/v1alpha1
Fields Type: FieldsV1
fieldsV1:
f:status:
.:
f:affectedPods:
.:
f:openshift-ovn-kubernetes/ovnkube-master-8g5sv:
f:openshift-ovn-kubernetes/ovnkube-master-9xxks:
f:openshift-ovn-kubernetes/ovnkube-master-gtx28:
f:openshift-ovn-kubernetes/ovnkube-node-bs2zx:
f:openshift-ovn-kubernetes/ovnkube-node-fvkks:
f:openshift-ovn-kubernetes/ovnkube-node-h26ms:
f:openshift-ovn-kubernetes/ovnkube-node-h9rbh:
f:openshift-ovn-kubernetes/ovnkube-node-k27xx:
f:openshift-ovn-kubernetes/ovnkube-node-n88th:
f:openshift-ovn-kubernetes/ovnkube-node-vb9nl:
f:criticalCount:
f:fixableCount:
f:highCount:
f:highestSeverity:
f:lastUpdate:
f:mediumCount:
Manager: security-labeller
Operation: Update
Subresource: status
Time: 2023-05-03T04:40:36Z
Resource Version: 120946
UID: f5193ef1-ec3c-4a59-8ed7-337b45d26e5b
Spec:
Features:
Name: python3-openvswitch2.17
Version: 2.17.0-62.el8fdp
Vulnerabilities:
Description: Open vSwitch provides standard network bridging functions and support for
the OpenFlow protocol for remote per-flow control of traffic.
Security Fix(es):
* openvswitch: Out-of-Bounds Read in Organization Specific TLV (CVE-2022-4337)
* openvswitch: Integer Underflow in Organization Specific TLV (CVE-2022-4338)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Fixedby: 0:2.17.0-71.el8fdp
Link: https://access.redhat.com/errata/RHSA-2023:0688 https://access.redhat.com/security/cve/CVE-2022-4337 https://access.redhat.com/security/cve/CVE-2022-4338
Metadata: {"UpdatedBy": "RHEL8-fast-datapath", "RepoName": "cpe:/o:redhat:enterprise_linux:8::fastdatapath", "RepoLink": null, "DistroName": "Red Hat Enterprise Linux Server", "DistroVersion": "8", "NVD": {"CVSSv3": {"Vectors": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "Score": 9.8}}}
Name: RHSA-2023:0688: openvswitch2.17 security, bug fix and enhancement update (Moderate)
Namespace Name: RHEL8-fast-datapath
Severity: Medium
Description: Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic.
Security Fix(es):
* openvswitch: ip proto 0 triggers incorrect handling (CVE-2023-1668)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* [23.C RHEL-8] Fast Datapath Release (BZ#2177685)
* [CT] Inner header of ICMP related traffic does not get DNATed (BZ#2178200)
Fixedby: 0:2.17.0-88.el8fdp
Link: https://access.redhat.com/errata/RHSA-2023:1765 https://access.redhat.com/security/cve/CVE-2023-1668
Metadata: {"UpdatedBy": "RHEL8-fast-datapath", "RepoName": "cpe:/o:redhat:enterprise_linux:8::fastdatapath", "RepoLink": null, "DistroName": "Red Hat Enterprise Linux Server", "DistroVersion": "8", "NVD": {"CVSSv3": {"Vectors": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "Score": 8.2}}}
Name: RHSA-2023:1765: openvswitch2.17 security update (Moderate)
Namespace Name: RHEL8-fast-datapath
Severity: Medium
Name: openvswitch2.17-devel
Version: 2.17.0-62.el8fdp
Vulnerabilities:
Description: Open vSwitch provides standard network bridging functions and support for
the OpenFlow protocol for remote per-flow control of traffic.
Security Fix(es):
* openvswitch: Out-of-Bounds Read in Organization Specific TLV (CVE-2022-4337)
* openvswitch: Integer Underflow in Organization Specific TLV (CVE-2022-4338)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Fixedby: 0:2.17.0-71.el8fdp
Link: https://access.redhat.com/errata/RHSA-2023:0688 https://access.redhat.com/security/cve/CVE-2022-4337 https://access.redhat.com/security/cve/CVE-2022-4338
Metadata: {"UpdatedBy": "RHEL8-fast-datapath", "RepoName": "cpe:/o:redhat:enterprise_linux:8::fastdatapath", "RepoLink": null, "DistroName": "Red Hat Enterprise Linux Server", "DistroVersion": "8", "NVD": {"CVSSv3": {"Vectors": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "Score": 9.8}}}
Name: RHSA-2023:0688: openvswitch2.17 security, bug fix and enhancement update (Moderate)
Namespace Name: RHEL8-fast-datapath
Severity: Medium
Description: Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic.
Security Fix(es):
* openvswitch: ip proto 0 triggers incorrect handling (CVE-2023-1668)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* [23.C RHEL-8] Fast Datapath Release (BZ#2177685)
* [CT] Inner header of ICMP related traffic does not get DNATed (BZ#2178200)
Fixedby: 0:2.17.0-88.el8fdp
Link: https://access.redhat.com/errata/RHSA-2023:1765 https://access.redhat.com/security/cve/CVE-2023-1668
Metadata: {"UpdatedBy": "RHEL8-fast-datapath", "RepoName": "cpe:/o:redhat:enterprise_linux:8::fastdatapath", "RepoLink": null, "DistroName": "Red Hat Enterprise Linux Server", "DistroVersion": "8", "NVD": {"CVSSv3": {"Vectors": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "Score": 8.2}}}
Name: RHSA-2023:1765: openvswitch2.17 security update (Moderate)
Namespace Name: RHEL8-fast-datapath
Severity: Medium
Name: pip
Version: 9.0.3
Vulnerabilities:
Description: Pip 21.1 updates its dependency 'urllib3' to v1.26.4 due to security issues.
Metadata: {"UpdatedBy": "pyupio", "RepoName": "pypi", "RepoLink": "https://pypi.org/simple", "DistroName": "", "DistroVersion": "", "NVD": {"CVSSv3": {"Vectors": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "Score": 6.5}}}
Name: pyup.io-40291 (CVE-2021-28363)
Namespace Name: pyupio
Severity: Medium
Description: A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.
Metadata: {"UpdatedBy": "pyupio", "RepoName": "pypi", "RepoLink": "https://pypi.org/simple", "DistroName": "", "DistroVersion": "", "NVD": {"CVSSv3": {"Vectors": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N", "Score": 5.7}}}
Name: pyup.io-42559 (CVE-2021-3572)
Namespace Name: pyupio
Severity: Medium
Description: Pip before 19.2 allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.
Metadata: {"UpdatedBy": "pyupio", "RepoName": "pypi", "RepoLink": "https://pypi.org/simple", "DistroName": "", "DistroVersion": "", "NVD": {"CVSSv3": {"Vectors": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "Score": 7.5}}}
Name: pyup.io-38765 (CVE-2019-20916)
Namespace Name: pyupio
Severity: High
Name: openvswitch2.17
Version: 2.17.0-62.el8fdp
Vulnerabilities:
Description: Open vSwitch provides standard network bridging functions and support for
the OpenFlow protocol for remote per-flow control of traffic.
Security Fix(es):
* openvswitch: Out-of-Bounds Read in Organization Specific TLV (CVE-2022-4337)
* openvswitch: Integer Underflow in Organization Specific TLV (CVE-2022-4338)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Fixedby: 0:2.17.0-71.el8fdp
Link: https://access.redhat.com/errata/RHSA-2023:0688 https://access.redhat.com/security/cve/CVE-2022-4337 https://access.redhat.com/security/cve/CVE-2022-4338
Metadata: {"UpdatedBy": "RHEL8-fast-datapath", "RepoName": "cpe:/o:redhat:enterprise_linux:8::fastdatapath", "RepoLink": null, "DistroName": "Red Hat Enterprise Linux Server", "DistroVersion": "8", "NVD": {"CVSSv3": {"Vectors": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "Score": 9.8}}}
Name: RHSA-2023:0688: openvswitch2.17 security, bug fix and enhancement update (Moderate)
Namespace Name: RHEL8-fast-datapath
Severity: Medium
Description: Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic.
Security Fix(es):
* openvswitch: ip proto 0 triggers incorrect handling (CVE-2023-1668)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* [23.C RHEL-8] Fast Datapath Release (BZ#2177685)
* [CT] Inner header of ICMP related traffic does not get DNATed (BZ#2178200)
Fixedby: 0:2.17.0-88.el8fdp
Link: https://access.redhat.com/errata/RHSA-2023:1765 https://access.redhat.com/security/cve/CVE-2023-1668
Metadata: {"UpdatedBy": "RHEL8-fast-datapath", "RepoName": "cpe:/o:redhat:enterprise_linux:8::fastdatapath", "RepoLink": null, "DistroName": "Red Hat Enterprise Linux Server", "DistroVersion": "8", "NVD": {"CVSSv3": {"Vectors": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "Score": 8.2}}}
Name: RHSA-2023:1765: openvswitch2.17 security update (Moderate)
Namespace Name: RHEL8-fast-datapath
Severity: Medium
Name: urllib3
Version: 1.24.2
Vulnerabilities:
Description: Urllib3 1.26.5 includes a fix for CVE-2021-33503: When provided with a URL containing many @ characters in the authority component, the authority regular expression exhibits catastrophic backtracking, causing a denial of service if a URL were passed as a parameter or redirected to via an HTTP redirect.
Metadata: {"UpdatedBy": "pyupio", "RepoName": "pypi", "RepoLink": "https://pypi.org/simple", "DistroName": "", "DistroVersion": "", "NVD": {"CVSSv3": {"Vectors": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "Score": 7.5}}}
Name: pyup.io-43975 (CVE-2021-33503)
Namespace Name: pyupio
Severity: High
Description: urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.
Metadata: {"UpdatedBy": "pyupio", "RepoName": "pypi", "RepoLink": "https://pypi.org/simple", "DistroName": "", "DistroVersion": "", "NVD": {"CVSSv3": {"Vectors": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", "Score": 7.2}}}
Name: pyup.io-38834 (CVE-2020-26137)
Namespace Name: pyupio
Severity: High
Name: setuptools
Version: 39.2.0
Vulnerabilities:
Description: Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in package_index.py.
Metadata: {"UpdatedBy": "pyupio", "RepoName": "pypi", "RepoLink": "https://pypi.org/simple", "DistroName": "", "DistroVersion": "", "NVD": {"CVSSv3": {"Vectors": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "Score": 5.9}}}
Name: pyup.io-52495 (CVE-2022-40897)
Namespace Name: pyupio
Severity: Medium
Name: libcurl
Version: 7.61.1-22.el8_6.5
Vulnerabilities:
Description: The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: HTTP multi-header compression denial of service (CVE-2023-23916)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Fixedby: 0:7.61.1-22.el8_6.6
Link: https://access.redhat.com/errata/RHSA-2023:1842 https://access.redhat.com/security/cve/CVE-2023-23916
Metadata: {"UpdatedBy": "RHEL8-rhel-8.6-eus", "RepoName": "cpe:/o:redhat:rhel_eus:8.6::baseos", "RepoLink": null, "DistroName": "Red Hat Enterprise Linux Server", "DistroVersion": "8", "NVD": {"CVSSv3": {"Vectors": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "Score": 6.5}}}
Name: RHSA-2023:1842: curl security update (Moderate)
Namespace Name: RHEL8-rhel-8.6-eus
Severity: Medium
Name: cryptography
Version: 3.2.1
Vulnerabilities:
Description: Cryptography 39.0.0 drops support for C library "LibreSSL" < 3.4, as these versions are not receiving security support anymore.
Metadata: {"UpdatedBy": "pyupio", "RepoName": "pypi", "RepoLink": "https://pypi.org/simple", "DistroName": "", "DistroVersion": "", "NVD": {"CVSSv3": {"Vectors": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "Score": 5.5}}}
Name: pyup.io-51159 (CVE-2021-41581)
Namespace Name: pyupio
Severity: Medium
Description: Cryptography 3.3.2 includes a fix for CVE-2020-36242: certain sequences of update calls to symmetrically encrypt multi-GB values could result in an integer overflow and buffer overflow, as demonstrated by the Fernet class.
Metadata: {"UpdatedBy": "pyupio", "RepoName": "pypi", "RepoLink": "https://pypi.org/simple", "DistroName": "", "DistroVersion": "", "NVD": {"CVSSv3": {"Vectors": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "Score": 9.1}}}
Name: pyup.io-39606 (CVE-2020-36242)
Namespace Name: pyupio
Severity: Critical
Description: Cryptography 39.0.1 updates its dependency 'OpenSSL' to v3.0.8 to include security fixes.
https://github.com/pyca/cryptography/issues/8229
Metadata: {"UpdatedBy": "pyupio", "RepoName": "pypi", "RepoLink": "https://pypi.org/simple", "DistroName": "", "DistroVersion": "", "NVD": {"CVSSv3": {"Vectors": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "Score": 7.4}}}
Name: pyup.io-53304 (CVE-2023-0286)
Namespace Name: pyupio
Severity: High
Description: Cryptography 39.0.1 updates its dependency 'OpenSSL' to v3.0.8 to include security fixes.
https://github.com/pyca/cryptography/issues/8229
Metadata: {"UpdatedBy": "pyupio", "RepoName": "pypi", "RepoLink": "https://pypi.org/simple", "DistroName": "", "DistroVersion": "", "NVD": {"CVSSv3": {"Vectors": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "Score": 5.9}}}
Name: pyup.io-53303 (CVE-2022-4304)
Namespace Name: pyupio
Severity: Medium
Description: Cryptography 39.0.1 updates its dependency 'OpenSSL' to v3.0.8 to include security fixes.
https://github.com/pyca/cryptography/issues/8229
Metadata: {"UpdatedBy": "pyupio", "RepoName": "pypi", "RepoLink": "https://pypi.org/simple", "DistroName": "", "DistroVersion": "", "NVD": {"CVSSv3": {"Vectors": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "Score": 7.5}}}
Name: pyup.io-53302 (CVE-2023-0216)
Namespace Name: pyupio
Severity: High
Description: Cryptography 39.0.1 updates its dependency 'OpenSSL' to v3.0.8 to include security fixes.
https://github.com/pyca/cryptography/issues/8229
Metadata: {"UpdatedBy": "pyupio", "RepoName": "pypi", "RepoLink": "https://pypi.org/simple", "DistroName": "", "DistroVersion": "", "NVD": {"CVSSv3": {"Vectors": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "Score": 7.5}}}
Name: pyup.io-53299 (CVE-2022-4450)
Namespace Name: pyupio
Severity: High
Description: Cryptography 39.0.1 includes a fix for CVE-2022-3996, a DoS vulnerability affecting openssl.
https://github.com/pyca/cryptography/issues/7940
Metadata: {"UpdatedBy": "pyupio", "RepoName": "pypi", "RepoLink": "https://pypi.org/simple", "DistroName": "", "DistroVersion": "", "NVD": {"CVSSv3": {"Vectors": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "Score": 7.5}}}
Name: pyup.io-53298 (CVE-2022-3996)
Namespace Name: pyupio
Severity: High
Description: Cryptography 39.0.1 updates its dependency 'OpenSSL' to v3.0.8 to include security fixes.
https://github.com/pyca/cryptography/issues/8229
Metadata: {"UpdatedBy": "pyupio", "RepoName": "pypi", "RepoLink": "https://pypi.org/simple", "DistroName": "", "DistroVersion": "", "NVD": {"CVSSv3": {"Vectors": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "Score": 4.9}}}
Name: pyup.io-53301 (CVE-2022-4203)
Namespace Name: pyupio
Severity: Medium
Description: Cryptography 39.0.1 updates its dependency 'OpenSSL' to v3.0.8 to include security fixes.
https://github.com/pyca/cryptography/issues/8229
Metadata: {"UpdatedBy": "pyupio", "RepoName": "pypi", "RepoLink": "https://pypi.org/simple", "DistroName": "", "DistroVersion": "", "NVD": {"CVSSv3": {"Vectors": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "Score": 7.5}}}
Name: pyup.io-53306 (CVE-2023-0217)
Namespace Name: pyupio
Severity: High
Description: Cryptography 39.0.1 updates its dependency 'OpenSSL' to v3.0.8 to include security fixes.
https://github.com/pyca/cryptography/issues/8229
Metadata: {"UpdatedBy": "pyupio", "RepoName": "pypi", "RepoLink": "https://pypi.org/simple", "DistroName": "", "DistroVersion": "", "NVD": {"CVSSv3": {"Vectors": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "Score": 7.5}}}
Name: pyup.io-53307 (CVE-2023-0401)
Namespace Name: pyupio
Severity: High
Description: Cryptography 39.0.1 updates its dependency 'OpenSSL' to v3.0.8 to include security fixes.
https://github.com/pyca/cryptography/issues/8229
Metadata: {"UpdatedBy": "pyupio", "RepoName": "pypi", "RepoLink": "https://pypi.org/simple", "DistroName": "", "DistroVersion": "", "NVD": {"CVSSv3": {"Vectors": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "Score": 7.5}}}
Name: pyup.io-53305 (CVE-2023-0215)
Namespace Name: pyupio
Severity: High
Description: Cryptography 39.0.1 includes a fix for CVE-2023-23931: In affected versions 'Cipher.update_into' would accept Python objects which implement the buffer protocol, but provide only immutable buffers. This would allow immutable objects (such as 'bytes') to be mutated, thus violating fundamental rules of Python and resulting in corrupted output. This issue has been present since 'update_into' was originally introduced in cryptography 1.8.
https://github.com/pyca/cryptography/security/advisories/GHSA-w7pp-m8wf-vj6r
Metadata: {"UpdatedBy": "pyupio", "RepoName": "pypi", "RepoLink": "https://pypi.org/simple", "DistroName": "", "DistroVersion": "", "NVD": {"CVSSv3": {"Vectors": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "Score": 6.5}}}
Name: pyup.io-53048 (CVE-2023-23931)
Namespace Name: pyupio
Severity: Medium
Name: curl
Version: 7.61.1-22.el8_6.5
Vulnerabilities:
Description: The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: HTTP multi-header compression denial of service (CVE-2023-23916)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Fixedby: 0:7.61.1-22.el8_6.6
Link: https://access.redhat.com/errata/RHSA-2023:1842 https://access.redhat.com/security/cve/CVE-2023-23916
Metadata: {"UpdatedBy": "RHEL8-rhel-8.6-eus", "RepoName": "cpe:/o:redhat:rhel_eus:8.6::baseos", "RepoLink": null, "DistroName": "Red Hat Enterprise Linux Server", "DistroVersion": "8", "NVD": {"CVSSv3": {"Vectors": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "Score": 6.5}}}
Name: RHSA-2023:1842: curl security update (Moderate)
Namespace Name: RHEL8-rhel-8.6-eus
Severity: Medium
Name: openvswitch2.17-ipsec
Version: 2.17.0-62.el8fdp
Vulnerabilities:
Description: Open vSwitch provides standard network bridging functions and support for
the OpenFlow protocol for remote per-flow control of traffic.
Security Fix(es):
* openvswitch: Out-of-Bounds Read in Organization Specific TLV (CVE-2022-4337)
* openvswitch: Integer Underflow in Organization Specific TLV (CVE-2022-4338)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Fixedby: 0:2.17.0-71.el8fdp
Link: https://access.redhat.com/errata/RHSA-2023:0688 https://access.redhat.com/security/cve/CVE-2022-4337 https://access.redhat.com/security/cve/CVE-2022-4338
Metadata: {"UpdatedBy": "RHEL8-fast-datapath", "RepoName": "cpe:/o:redhat:enterprise_linux:8::fastdatapath", "RepoLink": null, "DistroName": "Red Hat Enterprise Linux Server", "DistroVersion": "8", "NVD": {"CVSSv3": {"Vectors": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "Score": 9.8}}}
Name: RHSA-2023:0688: openvswitch2.17 security, bug fix and enhancement update (Moderate)
Namespace Name: RHEL8-fast-datapath
Severity: Medium
Description: Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic.
Security Fix(es):
* openvswitch: ip proto 0 triggers incorrect handling (CVE-2023-1668)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* [23.C RHEL-8] Fast Datapath Release (BZ#2177685)
* [CT] Inner header of ICMP related traffic does not get DNATed (BZ#2178200)
Fixedby: 0:2.17.0-88.el8fdp
Link: https://access.redhat.com/errata/RHSA-2023:1765 https://access.redhat.com/security/cve/CVE-2023-1668
Metadata: {"UpdatedBy": "RHEL8-fast-datapath", "RepoName": "cpe:/o:redhat:enterprise_linux:8::fastdatapath", "RepoLink": null, "DistroName": "Red Hat Enterprise Linux Server", "DistroVersion": "8", "NVD": {"CVSSv3": {"Vectors": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "Score": 8.2}}}
Name: RHSA-2023:1765: openvswitch2.17 security update (Moderate)
Namespace Name: RHEL8-fast-datapath
Severity: Medium
Image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256
Manifest: sha256:7a0e7eaf0dce2977b9efe41475867ffacf85a02d6a09543d9be0532022201150
Status:
Affected Pods:
openshift-ovn-kubernetes/ovnkube-master-8g5sv:
openshift-ovn-kubernetes/ovnkube-master-9xxks:
openshift-ovn-kubernetes/ovnkube-master-gtx28:
openshift-ovn-kubernetes/ovnkube-node-bs2zx:
openshift-ovn-kubernetes/ovnkube-node-fvkks:
openshift-ovn-kubernetes/ovnkube-node-h26ms:
openshift-ovn-kubernetes/ovnkube-node-h9rbh:
openshift-ovn-kubernetes/ovnkube-node-k27xx:
openshift-ovn-kubernetes/ovnkube-node-n88th:
openshift-ovn-kubernetes/ovnkube-node-vb9nl:
Critical Count: 1
Fixable Count: 10
High Count: 10
Highest Severity: Critical
Last Update: 2023-05-03 04:40:36.268208241 +0000 UTC
Medium Count: 17
Events: <none>
oc get pods -n openshift-ovn-kubernetes ovnkube-node-bs2zx -o yaml
apiVersion: v1
kind: Pod
metadata:
annotations:
networkoperator.openshift.io/ip-family-mode: single-stack
creationTimestamp: "2023-05-03T02:33:56Z"
generateName: ovnkube-node-
labels:
app: ovnkube-node
component: network
controller-revision-hash: 7d4cb86d8c
kubernetes.io/os: linux
openshift.io/component: network
pod-template-generation: "1"
type: infra
name: ovnkube-node-bs2zx
namespace: openshift-ovn-kubernetes
ownerReferences:
- apiVersion: apps/v1
blockOwnerDeletion: true
controller: true
kind: DaemonSet
name: ovnkube-node
uid: 1112e06a-6eb7-4524-8b94-e7bfb6083ab2
resourceVersion: "52268"
uid: 6b6c5ec9-8860-42f3-a798-443ce04b529d
spec:
affinity:
nodeAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchFields:
- key: metadata.name
operator: In
values:
- ip-10-66-101-254.ap-southeast-2.compute.internal
containers:
- command:
- /bin/bash
- -c
- "set -e\nif [[ -f \"/env/${K8S_NODE}\" ]]; then\n set -o allexport\n source
\"/env/${K8S_NODE}\"\n set +o allexport\nfi \n\necho \"$(date -Iseconds) -
starting ovn-controller\"\nexec ovn-controller unix:/var/run/openvswitch/db.sock
-vfile:off \\\n --no-chdir --pidfile=/var/run/ovn/ovn-controller.pid \\\n --syslog-method=\"null\"
\\\n --log-file=/var/log/ovn/acl-audit-log.log \\\n -vFACILITY:\"local0\"
\\\n -p /ovn-cert/tls.key -c /ovn-cert/tls.crt -C /ovn-ca/ca-bundle.crt \\\n
\ -vconsole:\"${OVN_LOG_LEVEL}\" -vconsole:\"acl_log:off\" \\\n -vPATTERN:console:\"%D{%Y-%m-%dT%H:%M:%S.###Z}|%05N|%c%T|%p|%m\"
\\\n -vsyslog:\"acl_log:info\" \\\n -vfile:\"acl_log:info\"\n"
env:
- name: OVN_LOG_LEVEL
value: info
- name: K8S_NODE
valueFrom:
fieldRef:
apiVersion: v1
fieldPath: spec.nodeName
image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7a0e7eaf0dce2977b9efe41475867ffacf85a02d6a09543d9be0532022201150
imagePullPolicy: IfNotPresent
name: ovn-controller
resources:
requests:
cpu: 10m
memory: 300Mi
securityContext:
privileged: true
terminationMessagePath: /dev/termination-log
terminationMessagePolicy: FallbackToLogsOnError
volumeMounts:
- mountPath: /run/openvswitch
name: run-openvswitch
- mountPath: /run/ovn/
name: run-ovn
- mountPath: /etc/openvswitch
name: etc-openvswitch
- mountPath: /etc/ovn/
name: etc-openvswitch
- mountPath: /var/lib/openvswitch
name: var-lib-openvswitch
- mountPath: /env
name: env-overrides
- mountPath: /ovn-cert
name: ovn-cert
- mountPath: /ovn-ca
name: ovn-ca
- mountPath: /var/log/ovn
name: node-log
- mountPath: /dev/log
name: log-socket
- mountPath: /var/run/secrets/kubernetes.io/serviceaccount
name: kube-api-access-5p5mc
readOnly: true
- command:
- /bin/bash
- -c
- "set -euo pipefail\n\n# Rotate audit log files when then get to max size (in
bytes)\nMAXFILESIZE=$(( \"50\"*1000000 )) \nLOGFILE=/var/log/ovn/acl-audit-log.log\nCONTROLLERPID=$(cat
/run/ovn/ovn-controller.pid)\n\n# Redirect err to null so no messages are shown
upon rotation\ntail -F ${LOGFILE} 2> /dev/null &\n\nwhile true\ndo\n # Make
sure ovn-controller's logfile exists, and get current size in bytes \n if [
-f \"$LOGFILE\" ]; then \n file_size=`du -b ${LOGFILE} | tr -s '\\t' ' '
| cut -d' ' -f1`\n else \n ovs-appctl -t /var/run/ovn/ovn-controller.${CONTROLLERPID}.ctl
vlog/reopen\n file_size=`du -b ${LOGFILE} | tr -s '\\t' ' ' | cut -d' ' -f1`\n
\ fi \n \n if [ $file_size -gt $MAXFILESIZE ];then\n echo \"Rotating OVN
ACL Log File\"\n timestamp=`date '+%Y-%m-%dT%H-%M-%S'`\n mv ${LOGFILE}
/var/log/ovn/acl-audit-log.$timestamp.log\n ovs-appctl -t /run/ovn/ovn-controller.${CONTROLLERPID}.ctl
vlog/reopen\n CONTROLLERPID=$(cat /run/ovn/ovn-controller.pid)\n fi\n\n
\ # sleep for 30 seconds to avoid wasting CPU \n sleep 30 \ndone\n"
image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7a0e7eaf0dce2977b9efe41475867ffacf85a02d6a09543d9be0532022201150
imagePullPolicy: IfNotPresent
name: ovn-acl-logging
resources:
requests:
cpu: 10m
memory: 20Mi
terminationMessagePath: /dev/termination-log
terminationMessagePolicy: FallbackToLogsOnError
volumeMounts:
- mountPath: /var/log/ovn
name: node-log
- mountPath: /run/ovn/
name: run-ovn
- mountPath: /var/run/secrets/kubernetes.io/serviceaccount
name: kube-api-access-5p5mc
readOnly: true
- command:
- /bin/bash
- -c
- |
#!/bin/bash
set -euo pipefail
TLS_PK=/etc/pki/tls/metrics-cert/tls.key
TLS_CERT=/etc/pki/tls/metrics-cert/tls.crt
# As the secret mount is optional we must wait for the files to be present.
# The service is created in monitor.yaml and this is created in sdn.yaml.
# If it isn't created there is probably an issue so we want to crashloop.
retries=0
TS=$(date +%s)
WARN_TS=$(( ${TS} + $(( 20 * 60)) ))
HAS_LOGGED_INFO=0
log_missing_certs(){
CUR_TS=$(date +%s)
if [[ "${CUR_TS}" -gt "WARN_TS" ]]; then
echo $(date -Iseconds) WARN: ovn-node-metrics-cert not mounted after 20 minutes.
elif [[ "${HAS_LOGGED_INFO}" -eq 0 ]] ; then
echo $(date -Iseconds) INFO: ovn-node-metrics-cert not mounted. Waiting one hour.
HAS_LOGGED_INFO=1
fi
}
while [[ ! -f "${TLS_PK}" || ! -f "${TLS_CERT}" ]] ; do
log_missing_certs
sleep 5
done
echo $(date -Iseconds) INFO: ovn-node-metrics-certs mounted, starting kube-rbac-proxy
exec /usr/bin/kube-rbac-proxy \
--logtostderr \
--secure-listen-address=:9103 \
--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 \
--upstream=http://127.0.0.1:29103/ \
--tls-private-key-file=${TLS_PK} \
--tls-cert-file=${TLS_CERT}
image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ffbccd590dcfe4400aa218659618a453e237951662ffb9ccab96d56156a9b31f
imagePullPolicy: IfNotPresent
name: kube-rbac-proxy
ports:
- containerPort: 9103
hostPort: 9103
name: https
protocol: TCP
resources:
requests:
cpu: 10m
memory: 20Mi
terminationMessagePath: /dev/termination-log
terminationMessagePolicy: FallbackToLogsOnError
volumeMounts:
- mountPath: /etc/pki/tls/metrics-cert
name: ovn-node-metrics-cert
readOnly: true
- mountPath: /var/run/secrets/kubernetes.io/serviceaccount
name: kube-api-access-5p5mc
readOnly: true
- command:
- /bin/bash
- -c
- |
#!/bin/bash
set -euo pipefail
TLS_PK=/etc/pki/tls/metrics-cert/tls.key
TLS_CERT=/etc/pki/tls/metrics-cert/tls.crt
# As the secret mount is optional we must wait for the files to be present.
# The service is created in monitor.yaml and this is created in sdn.yaml.
# If it isn't created there is probably an issue so we want to crashloop.
retries=0
TS=$(date +%s)
WARN_TS=$(( ${TS} + $(( 20 * 60)) ))
HAS_LOGGED_INFO=0
log_missing_certs(){
CUR_TS=$(date +%s)
if [[ "${CUR_TS}" -gt "WARN_TS" ]]; then
echo $(date -Iseconds) WARN: ovn-node-metrics-cert not mounted after 20 minutes.
elif [[ "${HAS_LOGGED_INFO}" -eq 0 ]] ; then
echo $(date -Iseconds) INFO: ovn-node-metrics-cert not mounted. Waiting one hour.
HAS_LOGGED_INFO=1
fi
}
while [[ ! -f "${TLS_PK}" || ! -f "${TLS_CERT}" ]] ; do
log_missing_certs
sleep 5
done
echo $(date -Iseconds) INFO: ovn-node-metrics-certs mounted, starting kube-rbac-proxy
exec /usr/bin/kube-rbac-proxy \
--logtostderr \
--secure-listen-address=:9105 \
--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 \
--upstream=http://127.0.0.1:29105/ \
--tls-private-key-file=${TLS_PK} \
--tls-cert-file=${TLS_CERT}
image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ffbccd590dcfe4400aa218659618a453e237951662ffb9ccab96d56156a9b31f
imagePullPolicy: IfNotPresent
name: kube-rbac-proxy-ovn-metrics
ports:
- containerPort: 9105
hostPort: 9105
name: https
protocol: TCP
resources:
requests:
cpu: 10m
memory: 20Mi
terminationMessagePath: /dev/termination-log
terminationMessagePolicy: FallbackToLogsOnError
volumeMounts:
- mountPath: /etc/pki/tls/metrics-cert
name: ovn-node-metrics-cert
readOnly: true
- mountPath: /var/run/secrets/kubernetes.io/serviceaccount
name: kube-api-access-5p5mc
readOnly: true
- command:
- /bin/bash
- -c
- |
set -xe
if [[ -f "/env/${K8S_NODE}" ]]; then
set -o allexport
source "/env/${K8S_NODE}"
set +o allexport
fi
cp -f /usr/libexec/cni/ovn-k8s-cni-overlay /cni-bin-dir/
ovn_config_namespace=openshift-ovn-kubernetes
echo "I$(date "+%m%d %H:%M:%S.%N") - disable conntrack on geneve port"
iptables -t raw -A PREROUTING -p udp --dport 6081 -j NOTRACK
iptables -t raw -A OUTPUT -p udp --dport 6081 -j NOTRACK
ip6tables -t raw -A PREROUTING -p udp --dport 6081 -j NOTRACK
ip6tables -t raw -A OUTPUT -p udp --dport 6081 -j NOTRACK
echo "I$(date "+%m%d %H:%M:%S.%N") - starting ovnkube-node"
if [ "shared" == "shared" ]; then
gateway_mode_flags="--gateway-mode shared --gateway-interface br-ex"
elif [ "shared" == "local" ]; then
gateway_mode_flags="--gateway-mode local --gateway-interface br-ex"
else
echo "Invalid OVN_GATEWAY_MODE: \"shared\". Must be \"local\" or \"shared\"."
exit 1
fi
export_network_flows_flags=
if [[ -n "${NETFLOW_COLLECTORS}" ]] ; then
export_network_flows_flags="--netflow-targets ${NETFLOW_COLLECTORS}"
fi
if [[ -n "${SFLOW_COLLECTORS}" ]] ; then
export_network_flows_flags="$export_network_flows_flags --sflow-targets ${SFLOW_COLLECTORS}"
fi
if [[ -n "${IPFIX_COLLECTORS}" ]] ; then
export_network_flows_flags="$export_network_flows_flags --ipfix-targets ${IPFIX_COLLECTORS}"
fi
if [[ -n "${IPFIX_CACHE_MAX_FLOWS}" ]] ; then
export_network_flows_flags="$export_network_flows_flags --ipfix-cache-max-flows ${IPFIX_CACHE_MAX_FLOWS}"
fi
if [[ -n "${IPFIX_CACHE_ACTIVE_TIMEOUT}" ]] ; then
export_network_flows_flags="$export_network_flows_flags --ipfix-cache-active-timeout ${IPFIX_CACHE_ACTIVE_TIMEOUT}"
fi
if [[ -n "${IPFIX_SAMPLING}" ]] ; then
export_network_flows_flags="$export_network_flows_flags --ipfix-sampling ${IPFIX_SAMPLING}"
fi
gw_interface_flag=
# if br-ex1 is configured on the node, we want to use it for external gateway traffic
if [ -d /sys/class/net/br-ex1 ]; then
gw_interface_flag="--exgw-interface=br-ex1"
fi
node_mgmt_port_netdev_flags=
if [[ -n "${OVNKUBE_NODE_MGMT_PORT_NETDEV}" ]] ; then
node_mgmt_port_netdev_flags="--ovnkube-node-mgmt-port-netdev ${OVNKUBE_NODE_MGMT_PORT_NETDEV}"
fi
exec /usr/bin/ovnkube --init-node "${K8S_NODE}" \
--nb-address "ssl:10.66.101.41:9641,ssl:10.66.101.59:9641,ssl:10.66.101.34:9641" \
--sb-address "ssl:10.66.101.41:9642,ssl:10.66.101.59:9642,ssl:10.66.101.34:9642" \
--nb-client-privkey /ovn-cert/tls.key \
--nb-client-cert /ovn-cert/tls.crt \
--nb-client-cacert /ovn-ca/ca-bundle.crt \
--nb-cert-common-name "ovn" \
--sb-client-privkey /ovn-cert/tls.key \
--sb-client-cert /ovn-cert/tls.crt \
--sb-client-cacert /ovn-ca/ca-bundle.crt \
--sb-cert-common-name "ovn" \
--config-file=/run/ovnkube-config/ovnkube.conf \
--loglevel "${OVN_KUBE_LOG_LEVEL}" \
--inactivity-probe="${OVN_CONTROLLER_INACTIVITY_PROBE}" \
${gateway_mode_flags} \
--metrics-bind-address "127.0.0.1:29103" \
--ovn-metrics-bind-address "127.0.0.1:29105" \
--metrics-enable-pprof \
--export-ovs-metrics \
--disable-snat-multiple-gws \
${export_network_flows_flags} \
${gw_interface_flag}
env:
- name: KUBERNETES_SERVICE_PORT
value: "6443"
- name: KUBERNETES_SERVICE_HOST
value: api-int.foster-rosa.ak27.p1.openshiftapps.com
- name: OVN_CONTROLLER_INACTIVITY_PROBE
value: "180000"
- name: OVN_KUBE_LOG_LEVEL
value: "4"
- name: K8S_NODE
valueFrom:
fieldRef:
apiVersion: v1
fieldPath: spec.nodeName
- name: POD_NAME
valueFrom:
fieldRef:
apiVersion: v1
fieldPath: metadata.name
image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7a0e7eaf0dce2977b9efe41475867ffacf85a02d6a09543d9be0532022201150
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
exec:
command:
- rm
- -f
- /etc/cni/net.d/10-ovn-kubernetes.conf
name: ovnkube-node
ports:
- containerPort: 29103
hostPort: 29103
name: metrics-port
protocol: TCP
readinessProbe:
exec:
command:
- test
- -f
- /etc/cni/net.d/10-ovn-kubernetes.conf
failureThreshold: 3
initialDelaySeconds: 5
periodSeconds: 5
successThreshold: 1
timeoutSeconds: 1
resources:
requests:
cpu: 10m
memory: 300Mi
securityContext:
privileged: true
terminationMessagePath: /dev/termination-log
terminationMessagePolicy: FallbackToLogsOnError
volumeMounts:
- mountPath: /etc/systemd/system
name: systemd-units
readOnly: true
- mountPath: /host
mountPropagation: HostToContainer
name: host-slash
readOnly: true
- mountPath: /run/ovn-kubernetes/
name: host-run-ovn-kubernetes
- mountPath: /run/netns
mountPropagation: HostToContainer
name: host-run-netns
readOnly: true
- mountPath: /cni-bin-dir
name: host-cni-bin
- mountPath: /etc/cni/net.d
name: host-cni-netd
- mountPath: /var/lib/cni/networks/ovn-k8s-cni-overlay
name: host-var-lib-cni-networks-ovn-kubernetes
- mountPath: /run/openvswitch
name: run-openvswitch
- mountPath: /run/ovn/
name: run-ovn
- mountPath: /etc/openvswitch
name: etc-openvswitch
- mountPath: /etc/ovn/
name: etc-openvswitch
- mountPath: /var/lib/openvswitch
name: var-lib-openvswitch
- mountPath: /run/ovnkube-config/
name: ovnkube-config
- mountPath: /env
name: env-overrides
- mountPath: /ovn-cert
name: ovn-cert
- mountPath: /ovn-ca
name: ovn-ca
- mountPath: /var/run/secrets/kubernetes.io/serviceaccount
name: kube-api-access-5p5mc
readOnly: true
dnsPolicy: Default
enableServiceLinks: true
hostNetwork: true
hostPID: true
imagePullSecrets:
- name: ovn-kubernetes-node-dockercfg-6pz8g
nodeName: ip-10-66-101-254.ap-southeast-2.compute.internal
nodeSelector:
beta.kubernetes.io/os: linux
preemptionPolicy: PreemptLowerPriority
priority: 2000001000
priorityClassName: system-node-critical
restartPolicy: Always
schedulerName: default-scheduler
securityContext: {}
serviceAccount: ovn-kubernetes-node
serviceAccountName: ovn-kubernetes-node
terminationGracePeriodSeconds: 30
tolerations:
- operator: Exists
volumes:
- hostPath:
path: /etc/systemd/system
type: ""
name: systemd-units
- hostPath:
path: /
type: ""
name: host-slash
- hostPath:
path: /run/netns
type: ""
name: host-run-netns
- hostPath:
path: /var/lib/openvswitch/data
type: ""
name: var-lib-openvswitch
- hostPath:
path: /etc/openvswitch
type: ""
name: etc-openvswitch
- hostPath:
path: /var/run/openvswitch
type: ""
name: run-openvswitch
- hostPath:
path: /var/run/ovn
type: ""
name: run-ovn
- hostPath:
path: /var/log/ovn
type: ""
name: node-log
- hostPath:
path: /dev/log
type: ""
name: log-socket
- hostPath:
path: /run/ovn-kubernetes
type: ""
name: host-run-ovn-kubernetes
- hostPath:
path: /var/lib/cni/bin
type: ""
name: host-cni-bin
- hostPath:
path: /var/run/multus/cni/net.d
type: ""
name: host-cni-netd
- hostPath:
path: /var/lib/cni/networks/ovn-k8s-cni-overlay
type: ""
name: host-var-lib-cni-networks-ovn-kubernetes
- configMap:
defaultMode: 420
name: ovnkube-config
name: ovnkube-config
- configMap:
defaultMode: 420
name: env-overrides
optional: true
name: env-overrides
- configMap:
defaultMode: 420
name: ovn-ca
name: ovn-ca
- name: ovn-cert
secret:
defaultMode: 420
secretName: ovn-cert
- name: ovn-node-metrics-cert
secret:
defaultMode: 420
optional: true
secretName: ovn-node-metrics-cert
- name: kube-api-access-5p5mc
projected:
defaultMode: 420
sources:
- serviceAccountToken:
expirationSeconds: 3607
path: token
- configMap:
items:
- key: ca.crt
path: ca.crt
name: kube-root-ca.crt
- downwardAPI:
items:
- fieldRef:
apiVersion: v1
fieldPath: metadata.namespace
path: namespace
- configMap:
items:
- key: service-ca.crt
path: service-ca.crt
name: openshift-service-ca.crt
status:
conditions:
- lastProbeTime: null
lastTransitionTime: "2023-05-03T02:33:56Z"
status: "True"
type: Initialized
- lastProbeTime: null
lastTransitionTime: "2023-05-03T02:59:33Z"
status: "True"
type: Ready
- lastProbeTime: null
lastTransitionTime: "2023-05-03T02:59:33Z"
status: "True"
type: ContainersReady
- lastProbeTime: null
lastTransitionTime: "2023-05-03T02:33:56Z"
status: "True"
type: PodScheduled
containerStatuses:
- containerID: cri-o://58bd69f92d62516c9728406f2d6b1480808f82647cf52c941fb640bd5b3e77b1
image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ffbccd590dcfe4400aa218659618a453e237951662ffb9ccab96d56156a9b31f
imageID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ffbccd590dcfe4400aa218659618a453e237951662ffb9ccab96d56156a9b31f
lastState: {}
name: kube-rbac-proxy
ready: true
restartCount: 1
started: true
state:
running:
startedAt: "2023-05-03T02:59:26Z"
- containerID: cri-o://071ac3c5bc6b640d7b55d3615a2fb609c09246db3231f7fecd7ea3c41685c6b3
image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ffbccd590dcfe4400aa218659618a453e237951662ffb9ccab96d56156a9b31f
imageID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ffbccd590dcfe4400aa218659618a453e237951662ffb9ccab96d56156a9b31f
lastState: {}
name: kube-rbac-proxy-ovn-metrics
ready: true
restartCount: 1
started: true
state:
running:
startedAt: "2023-05-03T02:59:26Z"
- containerID: cri-o://d7c4f7f1f3080ba560477b9fd95a6d68d49ae75dd699f4e75dbf2650e3d87c09
image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7a0e7eaf0dce2977b9efe41475867ffacf85a02d6a09543d9be0532022201150
imageID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7a0e7eaf0dce2977b9efe41475867ffacf85a02d6a09543d9be0532022201150
lastState: {}
name: ovn-acl-logging
ready: true
restartCount: 1
started: true
state:
running:
startedAt: "2023-05-03T02:59:25Z"
- containerID: cri-o://7b7816ad6e66d3bbb303d420d0817a7c5f4413873103fa1073fb372080d11cc9
image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7a0e7eaf0dce2977b9efe41475867ffacf85a02d6a09543d9be0532022201150
imageID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7a0e7eaf0dce2977b9efe41475867ffacf85a02d6a09543d9be0532022201150
lastState: {}
name: ovn-controller
ready: true
restartCount: 1
started: true
state:
running:
startedAt: "2023-05-03T02:59:25Z"
- containerID: cri-o://c713a63a10092a9a9d96e4719b99b537f2e244033e6f6af3ba2389bba1a21531
image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7a0e7eaf0dce2977b9efe41475867ffacf85a02d6a09543d9be0532022201150
imageID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7a0e7eaf0dce2977b9efe41475867ffacf85a02d6a09543d9be0532022201150
lastState: {}
name: ovnkube-node
ready: true
restartCount: 1
started: true
state:
running:
startedAt: "2023-05-03T02:59:26Z"
hostIP: 10.66.101.254
phase: Running
podIP: 10.66.101.254
podIPs:
- ip: 10.66.101.254
qosClass: Burstable
startTime: "2023-05-03T02:33:56Z"
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment