- Issued:
- 2020-09-16
- Updated:
- 2020-09-16
RHSA-2020:3727 - Security Advisory
Synopsis
Moderate: OpenShift Container Platform 3.11.286 security update
Type/Severity
Security Advisory: Moderate
Topic
An update for logging-kibana5-container and openshift-enterprise-registry-container is now available for Red Hat OpenShift Container Platform 3.11.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
OpenShift Container Platform components are primarily written in Go
(golang). The golang.org/x/text contains text-related packages which are used for
text operations, such as character encodings, text transformations, and
locale-specific text handling.
Kibana is one of the major components of OpenShift Container Platform
cluster logging. It is a browser-based console interface to query, discover, and visualize
the log data.
Security Fix(es):
- golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
- kibana: X-Frame-Option not set by default might lead to clickjacking (CVE-2020-10743)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
See the following documentation, which will be updated shortly for release
3.11.286, for important instructions on how to upgrade your cluster and fully
apply this asynchronous errata update:
https://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html
This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258.
Affected Products
- Red Hat OpenShift Container Platform 3.11 x86_64
- Red Hat OpenShift Container Platform for Power 3.11 ppc64le
Fixes
- BZ - 1834550 - CVE-2020-10743 kibana: X-Frame-Option not set by default might lead to clickjacking
- BZ - 1853652 - CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.