drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Cross-Site Request Forgery in OpenShift
Name: |
Cross-Site Request Forgery in OpenShift |
|
ID: |
RHSA-2019:4053-01 |
|
Distribution: |
Red Hat |
|
Plattformen: |
Red Hat OpenShift Enterprise |
|
Datum: |
Mo, 16. Dezember 2019, 18:50 |
|
Referenzen: |
https://access.redhat.com/security/cve/CVE-2019-10176 |
|
Applikationen: |
OKD |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: OpenShift Container Platform 3.11 openshift-enterprise-console-container security update Advisory ID: RHSA-2019:4053-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2019:4053 Issue date: 2019-12-16 CVE Names: CVE-2019-10176 =====================================================================
1. Summary:
An update for openshift-enterprise-console-container is now available for Red Hat OpenShift Container Platform 3.11.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
2. Description:
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
Security Fix(es):
* atomic-openshift: CSRF tokens not refreshing while user is logged in and are exposed in the URL (CVE-2019-10176)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
3. Solution:
See the following documentation, which will be updated shortly for release 3.11.157, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_r elease_notes.html
4. Bugs fixed (https://bugzilla.redhat.com/):
1712569 - CVE-2019-10176 atomic-openshift: CSRF tokens not refreshing while user is logged in and are exposed in the URL
5. References:
https://access.redhat.com/security/cve/CVE-2019-10176 https://access.redhat.com/security/updates/classification/#moderate
6. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBXfeOI9zjgjWX9erEAQjGJA//XQBmR6Fkax6uvJ8fG1aPSeRhw94v3fNQ c82fMdJzUAo+AynFsglF/oiOfuFA/Bg7b0F5ZtgnxoAGtnUqwN3uLS5osJtc2XHh 6BTOKvNXz4k+End0MZ2qB+YmpXmYkCGPLRe2ezQSLI7fqygWMbWoZGuztOHlMuPx Gpu2BXrGeawAdF+JGnQNOKCVTwNiprw7qDDzqWUrhnBREbudf4GIiMsKOKm15YaK Q4tBWspWAbLM5uWzQ4yMdvmeQwAiQzL4gr5CIjRRtXu9TQg4YtjGtj95ESxqWZS7 xREtiqoR61Ii1RqLggGM7uIl96P0sWi+xC5Hyw0D1zQl2MyiVesn4uBrENyfkQ+K fE5ZQ7vO1J87Gdb1R3jyvO5XYRVzs2U73S52JxETjkDNpuT7ljhezmxg/YXi+TpA 9z23FvdZo4ma4815a1p4WeuzJxDNCM4vudsHYIPyY1rjfOCsr8sE2ZVXp2mrKGT8 jS3YJNqhzQfLX8rQMED4u1iYh0BnmErqd96aKx/06nuSsyKAvLkMSo+XCD2j15jd fsjCOA3pP9048T3SABFRtW0v0/2Um36sX8gPnIFPl+vMf2xl8WL1krNuGSMGlutR IkbP3vU9t94x00vrYn/FUdN3cajz8P0nx5QmloTUiyR0NjYchsqISpqo40ugGCCt 1nWveTgxt6w= =qmL0 -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce
|
|
|
|