First published: Mon May 04 2020(Updated: )
Red Hat OpenShift Container Platform is Red Hat's cloud computing<br>Kubernetes application platform solution designed for on-premise or private<br>cloud deployments.<br>Security Fix(es):<br><li> proglottis/gpgme: Use-after-free in GPGME bindings during container image pull (CVE-2020-8945)</li> <li> containers/image: Container images read entire image manifest into memory (CVE-2020-1702)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/cri-o | <1.17.4-8.dev.rhaos4.4.git5f5c5e4.el8 | 1.17.4-8.dev.rhaos4.4.git5f5c5e4.el8 |
redhat/cri-o | <1.17.4-8.dev.rhaos4.4.git5f5c5e4.el8 | 1.17.4-8.dev.rhaos4.4.git5f5c5e4.el8 |
redhat/cri-o-debuginfo | <1.17.4-8.dev.rhaos4.4.git5f5c5e4.el8 | 1.17.4-8.dev.rhaos4.4.git5f5c5e4.el8 |
redhat/cri-o-debugsource | <1.17.4-8.dev.rhaos4.4.git5f5c5e4.el8 | 1.17.4-8.dev.rhaos4.4.git5f5c5e4.el8 |
redhat/cri-o | <1.17.4-8.dev.rhaos4.4.git5f5c5e4.el7 | 1.17.4-8.dev.rhaos4.4.git5f5c5e4.el7 |
redhat/cri-o | <1.17.4-8.dev.rhaos4.4.git5f5c5e4.el7 | 1.17.4-8.dev.rhaos4.4.git5f5c5e4.el7 |
redhat/cri-o-debuginfo | <1.17.4-8.dev.rhaos4.4.git5f5c5e4.el7 | 1.17.4-8.dev.rhaos4.4.git5f5c5e4.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2020:1937 is classified as moderate.
To fix RHSA-2020:1937, upgrade the CRI-O package to version 1.17.4-8.dev.rhaos4.4.git5f5c5e4.el8 or above.
RHSA-2020:1937 addresses a use-after-free vulnerability in GPGME bindings during container image pull.
Versions of CRI-O prior to 1.17.4-8.dev.rhaos4.4.git5f5c5e4.el8 are affected by RHSA-2020:1937.
There is no documented workaround for the vulnerability addressed in RHSA-2020:1937.