-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: OpenShift Container Platform 4.7 file-integrity-operator image security update
Advisory ID:       RHSA-2021:0100-01
Product:           Red Hat OpenShift Enterprise
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:0100
Issue date:        2021-02-24
CVE Names:         CVE-2020-27813 
====================================================================
1. Summary:

The file-integrity-operator image update is now available for OpenShift
Container Platform 4.7.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

The file-integrity-operator image update is now available for OpenShift
Container Platform 4.7.

Security Fix(es):

* golang-github-gorilla-websocket: integer overflow leads to denial of
service (CVE-2020-27813)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

4. Bugs fixed (https://bugzilla.redhat.com/):

1826301 - Wrong NodeStatus reports in file-integrity scan when configuration error in aide.conf file
1869293 - The configmap name looks confusing in aide-ds pod logs
1902111 - CVE-2020-27813 golang-github-gorilla-websocket: integer overflow leads to denial of service
1905011 - The file-integrity-Operator brew Bundle image does not available for OCP4.7
1910050 - [OCP v47] The file integrity aide-ds pod goes in CrashLoopBackOff state during the scan
1921692 - Please report fileintegritynodestatus (active/ failed / etc) in column when running `oc get fileintegritynodestatus`
1923096 - The daemonSet does not get updated when the nodeSelector and Tolerations get changed in fileIntegrity object

5. References:

https://access.redhat.com/security/cve/CVE-2020-27813
https://access.redhat.com/security/updates/classification/#moderate

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBYDbDEtzjgjWX9erEAQgu3hAAn2qYIjaObv0rj7Rytc1PrpsMJr3LnHyA
65HuBVGGJ+1WLZfRWcr0PGjF858OAGdHhwR7buFHdj1rOQ8lKPBI10TESI+ny8aC
KAdXVV+hSuB5/o8CRcP7p4vpu2680mOkRhwN1h7vJvrRxArF2jKjxgkS3OG31XYs
a322zlyQH6VHAHxrZizjXvKLY7L98A7R/BypquzqueN2jYWKxGpZZaGppZZ4rn4Q
2gYiTpht5g+UBImw6rBoBfZJh9xlRwXp5nv53oCPgXOJOWBGdhJK06ngWtuygzTf
nK5afvuycDi67VnMwhKXFZHHA/DIZrZgL0yMwzMWOdxFKeL6lnF8X26D9289cfVq
OzAQ9O5n5+80V1fw1OuyUxLKnk/C9rKs74Xd7ppT/FhnUl+OYgy+QYhdKYqnsWWq
X51E1ykROOmaNH3Y0d1Ib8R8m362sSZDdmk97FL18YZ5Tz/0EzzmOWFdMzhCdSUn
1+sOOamooIu4OTuuqnxpOSFndjcRcIZbLM1Z+aac0aqUVIoVQ1JgqQLFuGhpO8Gu
T5tDDRFGiHUKVaqpRLbDSMaoQJY5h8JL0SSlJ5ylFGXxmiU3m93r1iW97nB54/rG
Guf0zUHQ2o12Wj8MDwLOysNZK1yEP1IKxNMryvfKmr81wNOdA6BguhzoR+Oj7beq
aVOtG/isImc=BWbO
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2021-0100:01 Moderate: OpenShift Container Platform 4.7

The file-integrity-operator image update is now available for OpenShift Container Platform 4.7

Summary

The file-integrity-operator image update is now available for OpenShift Container Platform 4.7.
Security Fix(es):
* golang-github-gorilla-websocket: integer overflow leads to denial of service (CVE-2020-27813)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2020-27813 https://access.redhat.com/security/updates/classification/#moderate

Package List


Severity
Advisory ID: RHSA-2021:0100-01
Product: Red Hat OpenShift Enterprise
Advisory URL: https://access.redhat.com/errata/RHSA-2021:0100
Issued Date: : 2021-02-24
CVE Names: CVE-2020-27813

Topic

The file-integrity-operator image update is now available for OpenShiftContainer Platform 4.7.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures


Bugs Fixed

1826301 - Wrong NodeStatus reports in file-integrity scan when configuration error in aide.conf file

1869293 - The configmap name looks confusing in aide-ds pod logs

1902111 - CVE-2020-27813 golang-github-gorilla-websocket: integer overflow leads to denial of service

1905011 - The file-integrity-Operator brew Bundle image does not available for OCP4.7

1910050 - [OCP v47] The file integrity aide-ds pod goes in CrashLoopBackOff state during the scan

1921692 - Please report fileintegritynodestatus (active/ failed / etc) in column when running `oc get fileintegritynodestatus`

1923096 - The daemonSet does not get updated when the nodeSelector and Tolerations get changed in fileIntegrity object


Related News