-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: OpenShift Container Platform 4.1.18 gRPC security update Advisory ID: RHSA-2019:2861-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2019:2861 Issue date: 2019-09-26 CVE Names: CVE-2019-9512 CVE-2019-9514 CVE-2019-9515 ===================================================================== 1. Summary: An update for gRPC, included in sriov-network-device-plugin-container, is now available for Red Hat OpenShift Container Platform 4.1. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains updates gRPC in the sriov-network-device-plugin container in Red Hat OpenShift Container Platform 4.1.18. Security Fix(es): * HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512) * HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514) * HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: For OpenShift Container Platform 4.1 see the following documentation, which will be updated shortly for release 4.1.18, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-rel ease-notes.html 4. Bugs fixed (https://bugzilla.redhat.com/): 1735645 - CVE-2019-9512 HTTP/2: flood using PING frames results in unbounded memory growth 1735744 - CVE-2019-9514 HTTP/2: flood using HEADERS frames results in unbounded memory growth 1735745 - CVE-2019-9515 HTTP/2: flood using SETTINGS frames results in unbounded memory growth 5. References: https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515 https://access.redhat.com/security/updates/classification/#important 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXYzzvtzjgjWX9erEAQi8sA/9FPXjks9f8plp1ShGo8U3Ji9rT7iWGLa+ OzkGYACB7W27T0bKwj5mOHVuqOtg+FZ+PGtfQ1wE4/yrAySrKAYy9zsLc0q89+lf XOPDdp3+Svh4PBOuhHpOuRg+g1qZF69HN3XGecyoIWvbXYE4Kken9hu3hpAfHL5v MAJwWRJGw1PCjb7Ip6Ocr0fblffE8J9rgGNelCiYO+oZ39lkvU3VrdPWoPEQ+vQ3 rgwelpNrr7U3U8GDd7L4xuyT3LIgpgMqn11yIyq4PcB9VPSRJBLBZMO6CtPzbDnW ZFDhCrfhacQn765g3Y/hDWcO6/Au9zaWK+JOwkPy24ozqZ8TGm9rS1q1nGhEiHsu 9pk9SlC9FEdtN2dajU4ReKA6M/VRm2GRiEofsavHWf9U+WBPnKYHlV0TdeH+IFvu xA4Rc7IrB2y/QTqiBHuaPs6TU4+S7u+nz9S3PEJbUxGVP+lucFRX0yh0PTpFX4Sa RcOL5no6jLPD+tqrZrK50W7yvK+ctTieTLp8RCDePFzbGQMi9XxjP5CVttNY6TjO Z0UHOBb9OeT+S6Oj7UTPEXZG9W8xwO0WINtL0+1jstDy/SNs6UZOW84KiWaxQhad aNchfqPYFhQ74dU+srN4YGJ+eG3H1/S3t0ib+A8hNFPC802rA7h/GJ5qiyaF3AGy XqdhMfCY5mU= =kWUW -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce