First published: Wed Jun 17 2020(Updated: )
Red Hat OpenShift Container Platform is Red Hat's cloud computing<br>Kubernetes application platform solution designed for on-premise or private<br>cloud deployments.<br>Security Fix(es):<br><li> kubernetes: Server side request forgery (SSRF) in kube-controller-manager allowed users to leak secret information (CVE-2020-8555)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openshift | <4.4.0-202006061254.git.1.dc84fb4.el8 | 4.4.0-202006061254.git.1.dc84fb4.el8 |
redhat/openshift-hyperkube | <4.4.0-202006061254.git.1.dc84fb4.el8 | 4.4.0-202006061254.git.1.dc84fb4.el8 |
redhat/openshift | <4.4.0-202006061254.git.1.dc84fb4.el7 | 4.4.0-202006061254.git.1.dc84fb4.el7 |
redhat/openshift-hyperkube | <4.4.0-202006061254.git.1.dc84fb4.el7 | 4.4.0-202006061254.git.1.dc84fb4.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2020:2448 is classified as moderate.
You can fix RHSA-2020:2448 by updating to the specified remedied versions of open shifts or open shift hyperkube, such as 4.4.0-202006061254.git.1.dc84fb4.el8.
RHSA-2020:2448 addresses a server-side request forgery (SSRF) vulnerability in kube-controller-manager.
Affected software versions include certain versions of Red Hat OpenShift and OpenShift Hyperkube before the remedied versions.
Yes, applying the fix for RHSA-2020:2448 is necessary to mitigate the identified SSRF vulnerability.