First published: Wed May 13 2020(Updated: )
Red Hat OpenShift Container Platform is Red Hat's cloud computing<br>Kubernetes application platform solution designed for on-premise or private<br>cloud deployments.<br>Security Fix(es):<br><li> proglottis/gpgme: Use-after-free in GPGME bindings during container image pull (CVE-2020-8945)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openshift-clients | <4.2.32-202005020632.git.1.1b0fab9.el8 | 4.2.32-202005020632.git.1.1b0fab9.el8 |
redhat/openshift-clients | <4.2.32-202005020632.git.1.1b0fab9.el8 | 4.2.32-202005020632.git.1.1b0fab9.el8 |
redhat/openshift-clients-redistributable | <4.2.32-202005020632.git.1.1b0fab9.el8 | 4.2.32-202005020632.git.1.1b0fab9.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2020:2027 is classified as moderate.
To fix RHSA-2020:2027, update the affected packages to version 4.2.32-202005020632.git.1.1b0fab9.el8.
RHSA-2020:2027 addresses a use-after-free vulnerability in GPGME bindings during container image pull.
The affected packages include openshift-clients and openshift-clients-redistributable.
There is no official workaround for RHSA-2020:2027, and updating the packages is recommended.