Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Red Hat OpenShift Container Platform
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Red Hat OpenShift Container Platform
ID: RHBA-2024:11525
Distribution: Red Hat
Plattformen: Red Hat OpenShift Container Platform 4.17
Datum: Do, 9. Januar 2025, 16:15
Referenzen: https://access.redhat.com/security/cve/CVE-2023-38711
https://access.redhat.com/errata/RHBA-2024:11525
https://access.redhat.com/security/cve/CVE-2023-38712
https://access.redhat.com/security/cve/CVE-2024-2357
https://access.redhat.com/security/cve/CVE-2024-3652
https://access.redhat.com/security/cve/CVE-2023-30570
https://access.redhat.com/security/cve/CVE-2023-23009
https://access.redhat.com/security/cve/CVE-2023-38710
https://access.redhat.com/security/cve/CVE-2023-2295
Applikationen: Red Hat OpenShift Container Platform

Originalnachricht

Red Hat OpenShift Container Platform release 4.17.10 is now available with
updates to packages and images that fix several bugs.

Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private cloud deployments.

This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 4.17.10. See the following advisory for the container images for this release:

https://access.redhat.com/errata/RHBA-2024:11522

All OpenShift Container Platform 4.17 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.17/updating/updating_a_cluster/updating-cluster-cli.html

This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

CVE-2023-2295: Uncontrolled Resource Consumption (CWE-400)
CVE-2023-23009: Improper Input Validation (CWE-20)
CVE-2023-30570: Uncontrolled Resource Consumption (CWE-400)
CVE-2023-38710: Reachable Assertion (CWE-617)
CVE-2023-38711: NULL Pointer Dereference (CWE-476)
CVE-2023-38712: NULL Pointer Dereference (CWE-476)
CVE-2024-2357: Uncontrolled Resource Consumption (CWE-400)
CVE-2024-3652: Reachable Assertion (CWE-617)
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung