First published: Thu Mar 12 2020(Updated: )
Red Hat OpenShift Container Platform is Red Hat's cloud computing<br>Kubernetes application platform solution designed for on-premise or private<br>cloud deployments.<br>Security Fix(es):<br><li> proglottis/gpgme: Use-after-free in GPGME bindings during container image pull (CVE-2020-8945)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/skopeo | <0.1.32-6.git1715c90.el8_0 | 0.1.32-6.git1715c90.el8_0 |
redhat/containers-common | <0.1.32-6.git1715c90.el8_0 | 0.1.32-6.git1715c90.el8_0 |
redhat/skopeo | <0.1.32-6.git1715c90.el8_0 | 0.1.32-6.git1715c90.el8_0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2020:0697 is classified as moderate due to a use-after-free vulnerability in GPGME bindings.
To fix RHSA-2020:0697, update the affected packages to versions 0.1.32-6.git1715c90.el8_0 or later.
The affected packages in RHSA-2020:0697 are skopeo and containers-common.
A use-after-free vulnerability occurs when a program continues to use a pointer after the associated memory has been freed, potentially leading to arbitrary code execution.
Yes, RHSA-2020:0697 specifically affects Red Hat OpenShift Container Platform deployments on Red Hat Enterprise Linux 8.