Red Hat Security Advisory 2020-3578-01 ≈ Packet Storm – Digitalmunition




Exploit/Advisories no-image-featured-image.png

Published on September 9th, 2020 📆 | 3632 Views ⚑

0

Red Hat Security Advisory 2020-3578-01 ≈ Packet Storm

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Moderate: OpenShift Container Platform 4.5.8 security update
Advisory ID: RHSA-2020:3578-01
Product: Red Hat OpenShift Enterprise
Advisory URL: https://access.redhat.com/errata/RHSA-2020:3578
Issue date: 2020-09-08
CVE Names: CVE-2020-7015 CVE-2020-7598 CVE-2020-8174
CVE-2020-10531 CVE-2020-11080 CVE-2020-14040
====================================================================
1. Summary:

An update for cluster-network-operator-container,
cluster-version-operator-container, elasticsearch-operator-container,
logging-kibana6-container, and
ose-cluster-svcat-controller-manager-operator-container is now available
for Red Hat OpenShift Container Platform 4.5.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

OpenShift Container Platform components are primarily written in Go
(golang).
The golang.org/x/text contains text-related packages which are used for
text operations, such as character encodings, text transformations, and
locale-specific text handling.

Kibana is one of the major components of OpenShift Container Platform
cluster logging.
It is a browser-based console interface to query, discover, and visualize
the log data.

Security Fix(es):

* kibana: XSS in TSVB visualization (ESA-2020-08) (CVE-2020-7015)

* golang.org/x/text: Possibility to trigger an infinite loop in
encoding/unicode could lead to crash (CVE-2020-14040)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

For OpenShift Container Platform 4.5 see the following documentation, which
will be updated shortly for this release, for important instructions on
how to upgrade your cluster and fully apply this asynchronous errata
update:

https://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-rel
ease-notes.html

Details on how to access this content are available at
https://docs.openshift.com/container-platform/4.5/updating/updating-cluster
– -cli.html.

4. Bugs fixed (https://bugzilla.redhat.com/):

1849037 – CVE-2020-7015 kibana: XSS in TSVB visualization (ESA-2020-08)
1853652 – CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash

5. References:

https://access.redhat.com/security/cve/CVE-2020-7015
https://access.redhat.com/security/cve/CVE-2020-7598
https://access.redhat.com/security/cve/CVE-2020-8174
https://access.redhat.com/security/cve/CVE-2020-10531
https://access.redhat.com/security/cve/CVE-2020-11080
https://access.redhat.com/security/cve/CVE-2020-14040
https://access.redhat.com/security/updates/classification/#moderate

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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k7vx
—–END PGP SIGNATURE—–


RHSA-announce mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/rhsa-announce

Source link

Tagged with:



Leave a Reply

Your email address will not be published. Required fields are marked *


loading...