exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2020-0688-01

Red Hat Security Advisory 2020-0688-01
Posted Mar 10, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0688-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. A race condition has been addressed.

tags | advisory
systems | linux, redhat
advisories | CVE-2019-19921
SHA-256 | b6a978e16a30622f1ef08edd0d08057edbcb265b8178ca621f34da209a122b86

Red Hat Security Advisory 2020-0688-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Moderate: OpenShift Container Platform 4.2.22 runc security update
Advisory ID: RHSA-2020:0688-01
Product: Red Hat OpenShift Enterprise
Advisory URL: https://access.redhat.com/errata/RHSA-2020:0688
Issue date: 2020-03-10
CVE Names: CVE-2019-19921
====================================================================
1. Summary:

Red Hat OpenShift Container Platform release 4.2.22 is now available with
updates to packages and images that fix several bugs and add enhancements.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat OpenShift Container Platform 4.2 - s390x, x86_64

3. Description:

Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.

Security Fix(es):

* runc: volume mount race condition with shared mounts led to information
leak/integrity manipulation (CVE-2019-19921)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For OpenShift Container Platform 4.2 see the following documentation, which
will be updated shortly for release 4.2.22, for important instructions on
how to upgrade your cluster and fully apply this asynchronous errata
update:

https://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-rel
ease-notes.html

Details on how to access this content are available at
https://docs.openshift.com/container-platform/4.2/updating/updating-cluster
- -cli.html.

5. Bugs fixed (https://bugzilla.redhat.com/):

1796107 - CVE-2019-19921 runc: volume mount race condition with shared mounts leads to information leak/integrity manipulation

6. Package List:

Red Hat OpenShift Container Platform 4.2:

Source:
runc-1.0.0-63.rc10.rhaos4.2.gitdc9208a.el8.src.rpm

s390x:
runc-1.0.0-63.rc10.rhaos4.2.gitdc9208a.el8.s390x.rpm
runc-debuginfo-1.0.0-63.rc10.rhaos4.2.gitdc9208a.el8.s390x.rpm
runc-debugsource-1.0.0-63.rc10.rhaos4.2.gitdc9208a.el8.s390x.rpm

x86_64:
runc-1.0.0-63.rc10.rhaos4.2.gitdc9208a.el8.x86_64.rpm
runc-debuginfo-1.0.0-63.rc10.rhaos4.2.gitdc9208a.el8.x86_64.rpm
runc-debugsource-1.0.0-63.rc10.rhaos4.2.gitdc9208a.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-19921
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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KZAL
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close