Red Hat Security Advisory 2020-3414-01 ≈ Packet Storm – Digitalmunition




Exploit/Advisories no-image-featured-image.png

Published on August 12th, 2020 📆 | 2511 Views ⚑

0

Red Hat Security Advisory 2020-3414-01 ≈ Packet Storm

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Low: OpenShift Container Platform 4.5.5 security update
Advisory ID: RHSA-2020:3414-01
Product: Red Hat OpenShift Enterprise
Advisory URL: https://access.redhat.com/errata/RHSA-2020:3414
Issue date: 2020-08-12
CVE Names: CVE-2020-9283
====================================================================
1. Summary:

An update for atomic-openshift-descheduler-container and
ose-cluster-kube-descheduler-operator-container is now available for Red
Hat OpenShift Container Platform 4.5.

Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat OpenShift Container Platform is Red Hat’s cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.

Security Fix(es):

* golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys
allowed for panic (CVE-2020-9283)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

For OpenShift Container Platform 4.5 see the following documentation, which
will be updated shortly for release 4.5.5, for important instructions on
how to upgrade your cluster and fully apply this asynchronous errata
update:

https://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-rel
ease-notes.html

Details on how to access this content are available at
https://docs.openshift.com/container-platform/4.5/updating/updating-cluster
– -cli.html.

4. Bugs fixed (https://bugzilla.redhat.com/):

1804533 – CVE-2020-9283 golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic

5. References:

https://access.redhat.com/security/cve/CVE-2020-9283
https://access.redhat.com/security/updates/classification/#low

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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cnpZ
—–END PGP SIGNATURE—–


RHSA-announce mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/rhsa-announce

Source link

Tagged with:



Leave a Reply

Your email address will not be published. Required fields are marked *


loading...