Linux Security
    Linux Security
    Linux Security

    RedHat: RHSA-2021-0039:01 Moderate: OpenShift Container Platform 4.6.12

    Date 18 Jan 2021
    457
    Posted By LinuxSecurity Advisories
    Red Hat OpenShift Container Platform release 4.6.12 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score,
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA256
    
    =====================================================================
                       Red Hat Security Advisory
    
    Synopsis:          Moderate: OpenShift Container Platform 4.6.12 extras and security update
    Advisory ID:       RHSA-2021:0039-01
    Product:           Red Hat OpenShift Enterprise
    Advisory URL:      https://access.redhat.com/errata/RHSA-2021:0039
    Issue date:        2021-01-18
    CVE Names:         CVE-2020-1971 CVE-2020-2304 CVE-2020-2305 
                       CVE-2020-2306 CVE-2020-2307 CVE-2020-2308 
                       CVE-2020-2309 CVE-2020-8177 CVE-2020-25641 
                       CVE-2020-28362 
    =====================================================================
    
    1. Summary:
    
    Red Hat OpenShift Container Platform release 4.6.12 is now available with
    updates to packages and images that fix several bugs and add enhancements.
    
    Red Hat Product Security has rated this update as having a security impact
    of Moderate. A Common Vulnerability Scoring System (CVSS) base score,
    which gives a detailed severity rating, is available for each vulnerability
    from the CVE link(s) in the References section.
    
    2. Description:
    
    Red Hat OpenShift Container Platform is Red Hat's cloud computing
    Kubernetes application platform solution designed for on-premise or private
    cloud deployments.
    
    Security Fix(es):
    
    * golang: math/big: panic during recursive division of very large numbers
    (CVE-2020-28362)
    
    For more details about the security issue(s), including the impact, a CVSS
    score, acknowledgments, and other related information, refer to the CVE
    page(s) listed in the References section.
    
    This advisory contains the RPM packages for Red Hat OpenShift Container
    Platform 4.6.12. See the following advisory for the container images for
    this release:
    
    https://access.redhat.com/errata/RHSA-2021:0037
    
    All OpenShift Container Platform 4.6 users are advised to upgrade to these
    updated packages and images when they are available in the appropriate
    release channel. To check for available updates, use the OpenShift Console
    or the CLI oc command. Instructions for upgrading a cluster are available
    at
    https://docs.openshift.com/container-platform/4.6/updating/updating-cluster
    - -between-minor.html#understanding-upgrade-channels_updating-cluster-between
    - -minor.
    
    3. Solution:
    
    For OpenShift Container Platform 4.6 see the following documentation, which
    will be updated shortly for this release, for important instructions on how
    to upgrade your cluster and fully apply this asynchronous errata update:
    
    https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-rel
    ease-notes.html
    
    Details on how to access this content are available at
    https://docs.openshift.com/container-platform/4.6/updating/updating-cluster
    - -cli.html.
    
    4. Bugs fixed (https://bugzilla.redhat.com/):
    
    1888393 - Alert ElasticsearchBulkRequestsRejectionJumps never gets pending/firing due to there is no `bulk` thread pool.
    1890801 - Changes on spec.logStore.elasticsearch.nodeCount not reflected when decreasing the number of nodes
    1892794 - Reduce log chatter in cluster logging operator
    1897635 - CVE-2020-28362 golang: math/big: panic during recursive division of very large numbers
    1901299 - Change ES Operator CSV to clarify the scope for this Operator
    1907519 - [logforward]error_class=ArgumentError error="time must be a Fluent::EventTime (or Integer): Float"
    1909614 - Old kibana index causing crashloop
    1909616 - Facing error "Cannot authenticate user because admin user is not permitted to login via HTTP" in OCP 4.5.20
    1913104 - Placeholder bug for OCP 4.6.0 extras release
    
    5. References:
    
    https://access.redhat.com/security/cve/CVE-2020-1971
    https://access.redhat.com/security/cve/CVE-2020-2304
    https://access.redhat.com/security/cve/CVE-2020-2305
    https://access.redhat.com/security/cve/CVE-2020-2306
    https://access.redhat.com/security/cve/CVE-2020-2307
    https://access.redhat.com/security/cve/CVE-2020-2308
    https://access.redhat.com/security/cve/CVE-2020-2309
    https://access.redhat.com/security/cve/CVE-2020-8177
    https://access.redhat.com/security/cve/CVE-2020-25641
    https://access.redhat.com/security/cve/CVE-2020-28362
    https://access.redhat.com/security/updates/classification/#moderate
    
    6. Contact:
    
    The Red Hat security contact is . More contact
    details at https://access.redhat.com/security/team/contact/
    
    Copyright 2021 Red Hat, Inc.
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1
    
    iQIVAwUBYAXIPtzjgjWX9erEAQir1w//UnkkrCtAm4ZVRiNdu1De53RIuqfzi2Ck
    pUijLCmuM9YJE2q949bHpAlTOXF3Lk7ZFEN4RnbG9tSi6B7aX7uAPY9iprL+8CLA
    G4cIW8Nn2HFGM0MUOzMhFhDwHhp+veXkxeD6ptMLCBMIG8K1dWq4MICBA4hxwPmD
    R9MQTPiNY2C+M3FlGl3OuPg/4OuLETvgJcjXCn98O6dGk72/uMs85A0+2AQ+QDI/
    EUJIIwz7pNlU6bmAuTwsKCGShP7bm69W+lKG8gDlRYaZFowzuTkAFzEH6j88ZF7R
    atm0QeqtWGnagSJ+62zI2Qt0n8JdLXO6PHoNEzNBfTc5SR0e8GPxzAyRyryT+fiK
    1zVHICcTThKOFdMP54BsDkx7889ockd3E5XmcBRTeNWlbJCyTWEGa0fjVHRL1WvL
    /+OUIduecwrKWsdrjAPsh/ncVkLs6Hz6Ypz6C02WSSxD1XKHvd09Gb2h3BWRfcKg
    OUodTNfdWW74evVgIfAwxRzRoS9XhfkiUOkguDLfdmlTekNNyFJWK8JaqgVveIKd
    drgap/u9MVSdHQoy0qKbiZFU2p5uGY7zq07eoEy81zjafwEspugdR3sANIfY1ag6
    hVnIPe7XWs/tdljwrHaHsCUju2APoFswtKEaT6putqa/9Nw0e/TlYTCrvLoib4+9
    kPZMH5lOWjA=
    =EPJM
    -----END PGP SIGNATURE-----
    
    --
    RHSA-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.redhat.com/mailman/listinfo/rhsa-announce
    

    LinuxSecurity Poll

    Which is the best secure Linux distro for pentesting?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/50-which-is-the-best-secure-linux-distro-for-pentesting?task=poll.vote&format=json
    50
    radio
    [{"id":"174","title":"Kali Linux","votes":"9","type":"x","order":"1","pct":56.25,"resources":[]},{"id":"175","title":"Parrot OS","votes":"7","type":"x","order":"2","pct":43.75,"resources":[]},{"id":"176","title":"BlackArch Linux","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.