RedHat: RHSA-2020-0476:01 Low: OpenShift Container Platform 4.2.18

    Date 12 Feb 2020
    491
    Posted By LinuxSecurity Advisories
    An update for ose-baremetal-installer-container and ose-cli-artifacts-container is now available for Red Hat OpenShift Container Platform 4.2. Red Hat Product Security has rated this update as having a security impact
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA256
    
    =====================================================================
                       Red Hat Security Advisory
    
    Synopsis:          Low: OpenShift Container Platform 4.2.18 ose-baremetal-installer-container and ose-cli-artifacts-container security update
    Advisory ID:       RHSA-2020:0476-01
    Product:           Red Hat OpenShift Enterprise
    Advisory URL:      https://access.redhat.com/errata/RHSA-2020:0476
    Issue date:        2020-02-12
    CVE Names:         CVE-2019-13734 CVE-2019-19335 
    =====================================================================
    
    1. Summary:
    
    An update for ose-baremetal-installer-container and
    ose-cli-artifacts-container is now available for Red Hat OpenShift
    Container Platform 4.2.
    
    Red Hat Product Security has rated this update as having a security impact
    of Low. A Common Vulnerability Scoring System (CVSS) base score, which
    gives a detailed severity rating, is available for each vulnerability from
    the CVE link(s) in the References section.
    
    2. Description:
    
    Red Hat OpenShift Container Platform is Red Hat's cloud computing
    Kubernetes application platform solution designed for on-premise or private
    cloud deployments.
    
    Security Fix(es):
    
    * openshift/installer: kubeconfig and kubeadmin-password are created with
    word-readable permissions (CVE-2019-19335)
    
    For more details about the security issue(s), including the impact, a CVSS
    score, acknowledgments, and other related information, refer to the CVE
    page(s) listed in the References section.
    
    3. Solution:
    
    For OpenShift Container Platform 4.2 see the following documentation, which
    will be updated shortly for release 4.2.18, for important instructions on
    how to upgrade your cluster and fully apply this asynchronous errata
    update:
    
    https://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-rel
    ease-notes.html
    
    Details on how to access this content are available at
    https://docs.openshift.com/container-platform/4.2/updating/updating-cluster
    - -cli.html.
    
    4. Bugs fixed (https://bugzilla.redhat.com/):
    
    1777209 - CVE-2019-19335 openshift/installer: kubeconfig and kubeadmin-password are created with word-readable permissions
    
    5. References:
    
    https://access.redhat.com/security/cve/CVE-2019-13734
    https://access.redhat.com/security/cve/CVE-2019-19335
    https://access.redhat.com/security/updates/classification/#low
    
    6. Contact:
    
    The Red Hat security contact is . More contact
    details at https://access.redhat.com/security/team/contact/
    
    Copyright 2020 Red Hat, Inc.
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1
    
    iQIVAwUBXkPhvtzjgjWX9erEAQhfABAAi1TBPMDufTOh2rMV33j7Xp5qka0Fv1Ne
    qnmt9+yuAaeZM0HEaaSgPTSYqPzoS4doAKLdlKxnFO00dDOwOaNJZ3lvANq82dIS
    c+TQqpFBxgIntOpIn+YRGkTlT3E1cDvgyK6vcZO/9qjm4qR3XCr/vZNIS2eCQjo0
    3Uw/zSa++iPgY/v3c06yLt5bBCsesRSCdcWuGb5NJ9y8SyubvNPfMmXc1ooXt8hR
    cARBN/08SBLxIeao7Wgft6J5EpjKjDlyyoVCnkEj82cnc96g+Kz5jXPfByMFbDr6
    LyDl/W0yt5d7im/ISnp/2uUsyrSMSWyYIZaDrVUGP+lh+I1c7W9qIn/2kvhX/H7f
    npw0Aw4Bspkp7NXgtE3yBlpCW1wpAKA6Gs0wgutH2SSJaY8czt84YGQcuuO9OjTT
    0q+qng8ezFaOVE5axWWz3Spm2UDyAT7yRwi0upbRc+5WIhmnD7CZXE5l/J968YOv
    GEFBaC3zUwaCxMBhVCxcvwDlpvMAPNtL1uV+avGgUVR/FkYLfQCGwvZd6bB+QuaO
    g2PrRtvmrh9J7ameBLSU1TqRFE9XCGit9K6DTAd+VFS0hwlhKPdkdbr0U4XZi+nm
    f0mWB508Sj0BMThK8hNvaUylnayIvJEuDG/sAyvc6YRunf6gAT5utWDdGeUvNjlT
    sNM0v4q69iY=
    =2u+E
    -----END PGP SIGNATURE-----
    
    --
    RHSA-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.redhat.com/mailman/listinfo/rhsa-announce
    

    LinuxSecurity Poll

    Do you feel that the Lawful Access to Encrypted Data Act, which aims to force encryption backdoors, is a threat to US citizens' privacy?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/30-do-you-feel-that-the-lawful-access-to-encrypted-data-act-which-aims-to-force-encryption-backdoors-is-a-threat-to-privacy?task=poll.vote&format=json
    30
    radio
    [{"id":"106","title":"Yes - I am a privacy advocate and I am strongly opposed to this bill.","votes":"7","type":"x","order":"1","pct":100,"resources":[]},{"id":"107","title":"I'm undecided - it has its pros and cons.","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"108","title":"No - I support this bill and feel that it will help protect against crime and threats to our national security. ","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.