What Red Hat OpenShift Online and OpenShift Dedicated Customers Should Know About the June 2019 Kernel Network Stack Flaws
June 19, 2019 | by
On Monday, June 17, 2019, details were made public about security flaws that impact systems hosting Red Hat OpenShift Online (Starter and Pro) and Red Hat OpenShift Dedicated. For information on the CVEs, visit CVE-2019-11477, CVE-2019-11478, and CVE-2019-11479. The vulnerability article can be found here.
The intent of this blog is to notify our customers and the community of the actions Red Hat and the OpenShift SRE team have taken to patch and protect OpenShift Online and OpenShift Dedicated services.
Prior to the public announcement, OpenShift SRE initiated mitigation of the most severe of the flaws
On June 17, 2019, at approximately 17:00 (UTC), Netflix publicly announced the details of the flaws and remediations
Shortly thereafter, OpenShift SRE initiated remediation on clusters
Remediation is in-progress, based on the preferred maintenance time-zones for each customer
Any questions about the vulnerabilities or patches should be directed to Red Hat Support.
At Red Hat, the safety and security of our customers’ software and data is of utmost importance. Thank you for your continued trust and confidence in working with us.
This page will be updated with additional information as it becomes available.
Overview Red Hat Advanced Cluster Security (RHACS) Central is installed with one administrator user by default. Typically, customers request an integration with existing Identity Provider(s) (IDP). ...
This is a guest post written by Milan Patel, Product Manager, IBM Security Verify. IBM Security Verify SaaS is a purpose-built Identity-as-a-Service (IDaaS) to help clients optimize how they protect ...
What is Log4Shell? Last week, one of the most critical 0-day vulnerabilities in several years was made public. This issue was found in the commonly used Java logging utility, Apache Log4j, version 2, ...