-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: OpenShift Container Platform 4.2.22 skopeo security update Advisory ID: RHSA-2020:0689-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2020:0689 Issue date: 2020-03-10 CVE Names: CVE-2020-8945 ==================================================================== 1. Summary: An update for skopeo is now available for Red Hat OpenShift Container Platform 4.2. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat OpenShift Container Platform 4.2 - s390x, x86_64 3. Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Security Fix(es): * proglottis/gpgme: Use-after-free vulnerability was found in GPGME bindings during container image pull (CVE-2020-8945) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For OpenShift Container Platform 4.2 see the following documentation, which will be updated shortly for release 4.2.22, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-rel ease-notes.html Details on how to access this content are available at https://docs.openshift.com/container-platform/4.2/updating/updating-cluster - -cli.html. 5. Bugs fixed (https://bugzilla.redhat.com/): 1795838 - CVE-2020-8945 proglottis/gpgme: Use-after-free in GPGME bindings during container image pull 6. Package List: Red Hat OpenShift Container Platform 4.2: Source: skopeo-0.1.32-7.git1715c90.rhaos4.2.el8.src.rpm s390x: containers-common-0.1.32-7.git1715c90.rhaos4.2.el8.s390x.rpm skopeo-0.1.32-7.git1715c90.rhaos4.2.el8.s390x.rpm skopeo-debuginfo-0.1.32-7.git1715c90.rhaos4.2.el8.s390x.rpm skopeo-debugsource-0.1.32-7.git1715c90.rhaos4.2.el8.s390x.rpm x86_64: containers-common-0.1.32-7.git1715c90.rhaos4.2.el8.x86_64.rpm skopeo-0.1.32-7.git1715c90.rhaos4.2.el8.x86_64.rpm skopeo-debuginfo-0.1.32-7.git1715c90.rhaos4.2.el8.x86_64.rpm skopeo-debugsource-0.1.32-7.git1715c90.rhaos4.2.el8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2020-8945 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXmeGqdzjgjWX9erEAQjm6w//cVAKpya3efg3Yblso3dGRUY7AYsnQG4m Sumdguf+1WIEQ0WHCKACGyJ5P9TZU3OrxADFo+p1KTXeJtjcq1TZfuwmDvK2RtB0 +58wZ4SUR1c2dH+emYhhTI/HKO6aVMLGTF9RhdAjEREByPIkatGr2WFH5QGKHD2m 0GvKxq7Q+DNLgiL62YNvQo/2LfW9S4zu+KiW2FCvawVFxAmOR4LzWsmMHcKX1u6H 07xc8IOKtY9lcEZpRy+0M0UBJBo4R26Rwy5zyk/02Wv95q0enHc2/nfEGBMM8NKr fsxl+OAl5DfXBISR2LEwgUKbpyIjggBdnEbXv7NGbs/DoWs4ZqcxlHBrvVuZZsXr 5McS4I53UiAenPmi5YOiDaUfkY14fCibp1dcwJ8AZZqkopI2H1T5XcJHsNfGaQty ufKw89FFc+I6Ofa2X5esJ2LaecMvu3IhH40FniYf82utkg9D6l5UdzHfjcPHqfRE Pw59ZFUxFpQHfFjA0Dqv864EzVWhdn2TuhADBqUd9HgIYVxz9qwwtLyJrI4Ggn6T A4pFIX0VZkmp0Q6bRWKeSTqiA9RNJZuixKGzgx0PTrLTtrmlrTvcuJRXosm33dld KuPqAI66r5udRe+5GmliG7brON4afqNeUMU+W/XWh8I7CezRdhkZbziZTyrrOqOA iw7CzE8liC0=vgRC -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce