exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2020-1545-01

Red Hat Security Advisory 2020-1545-01
Posted Apr 23, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-1545-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. An issue was resolved where /etc/passwd was given incorrect privileges.

tags | advisory
systems | linux, redhat
advisories | CVE-2019-19355
SHA-256 | 872a47f8349f6890ebb28e1e3af1534542d1e0a335f49a9faafbd7b193f5b0f1

Red Hat Security Advisory 2020-1545-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: OpenShift Container Platform 4.1.41 openshift-enterprise-ansible-operator-container security update
Advisory ID: RHSA-2020:1545-01
Product: Red Hat OpenShift Enterprise
Advisory URL: https://access.redhat.com/errata/RHSA-2020:1545
Issue date: 2020-04-22
CVE Names: CVE-2019-19355
=====================================================================

1. Summary:

An update for openshift-enterprise-ansible-operator-container is now
available for Red Hat OpenShift Container Platform 4.1.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.

Security Fix(es):

* openshift/ocp-release-operator-sdk: /etc/passwd is given incorrect
privileges (CVE-2019-19355)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

For OpenShift Container Platform 4.1 see the following documentation, which
will be updated shortly for release 4.1.41, for important instructions on
how to upgrade your cluster and fully apply this asynchronous errata
update:

https://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-rel
ease-notes.html

Details on how to access this content are available at
https://docs.openshift.com/container-platform/4.1/updating/updating-cluster
- -cli.html.

4. Bugs fixed (https://bugzilla.redhat.com/):

1793277 - CVE-2019-19355 openshift/ocp-release-operator-sdk: /etc/passwd is given incorrect privileges

5. References:

https://access.redhat.com/security/cve/CVE-2019-19355
https://access.redhat.com/security/updates/classification/#moderate

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=WT/c
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close