ELSA-2021-9029

ELSA-2021-9029 - olcne security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2021-02-10

Description


kata-runtime
[1.7.3-1.0.7]
- Address CVE-2020-28914

kata
[1.7.3-1.0.12]
- UEKR6 guest kernel support

[1.7.3-1.0.11]
- Address CVE-2020-28914

kubernetes
[1.17.9-1.0.6]
- Kata CVE-2020-28914

olcne
[1.1.10-1]
- Address CVE-2020-28914: An improper file permissions vulnerability affects Kata Containers prior to 1.11.5

[1.1.9-1]
- Enhance the Kubernetes module to restrict the usage of external IPs
- Address CVE-2020-8554: man-in-the-middle vulnerability using Kubernetes service External IPs


Related CVEs


CVE-2020-28914
CVE-2020-8554

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 7 (x86_64) kata-1.7.3-1.0.12.el7.src.rpm2d4631d90d7749be2b0523a877d44a679364afd51971fbc1d8c069fafaea8d89ELSA-2024-12189ol7_x86_64_olcne11
kata-runtime-1.7.3-1.0.7.el7.src.rpm9933aa63daa2ed655c321d35991f2ca01c74cb13aeeef44bfd21f30ce269b1faELSA-2024-12189ol7_x86_64_olcne11
kubernetes-1.17.9-1.0.6.el7.src.rpmcac762dc833429fe106740cbe1f180caaf05b3f9204b501589ca65a1a668dca8ELSA-2024-12329ol7_x86_64_olcne11
olcne-1.1.10-1.el7.src.rpmaaa0e1f5d9a739467d8c90db61ded3f289df650c6263a85e1c88aba51b839fdbELSA-2024-12329ol7_x86_64_olcne11
kata-1.7.3-1.0.12.el7.x86_64.rpm4eb1c644580bf7dfb88e73c3edcb9903203ba692f7cf8eddad2b1dcca7798b99ELSA-2024-12189ol7_x86_64_olcne11
kata-runtime-1.7.3-1.0.7.el7.x86_64.rpmb974f2701e6e14752a61679af9fd6dae2b777b63b1e3c4c8bdbb9dbe8bbb8798ELSA-2024-12189ol7_x86_64_olcne11
kubeadm-1.17.9-1.0.6.el7.x86_64.rpm52c2043f8ef999565dbd979d73c55f2571bf080991dddbec1ac846e95256b6caELSA-2024-12329ol7_x86_64_olcne11
kubectl-1.17.9-1.0.6.el7.x86_64.rpm54d842a7607f25b7da8c07c87e0e3d43aed7262746066d55916797b2dc409eeeELSA-2024-12329ol7_x86_64_olcne11
kubelet-1.17.9-1.0.6.el7.x86_64.rpm2fa58e34f9cadc07aea40a5661ce40667771793645a842187d722c3795e76730ELSA-2024-12329ol7_x86_64_olcne11
olcne-agent-1.1.10-1.el7.x86_64.rpma0cede7bc030e48776dc740bc40ca80ae585830b121e74cd1aa8ea9a2b36f6abELSA-2024-12329ol7_x86_64_olcne11
olcne-api-server-1.1.10-1.el7.x86_64.rpm37c4bfb8eb15bf977385b3ae962ce6631ca05e7669096f0522332ba852667c56ELSA-2024-12329ol7_x86_64_olcne11
olcne-istio-chart-1.1.10-1.el7.x86_64.rpm462e39c872267e017352bfafb0b898940f8636d9cf7c707eae7a9f44584cd619ELSA-2024-12329ol7_x86_64_olcne11
olcne-nginx-1.1.10-1.el7.x86_64.rpm880b9adc50fc5e9b71992d57af843f886f536b9da6bd2fd11f95c5bd637b36e7ELSA-2024-12329ol7_x86_64_olcne11
olcne-prometheus-chart-1.1.10-1.el7.x86_64.rpma2c8d74c26165a8c469016d711177612ac4c98b3342a5e0651b3753343dd28d4ELSA-2024-12329ol7_x86_64_olcne11
olcne-utils-1.1.10-1.el7.x86_64.rpmb3bfe4c3c21363fa6b879d20cfb325093c451d32a0ea7f8d1cc7656781df941aELSA-2024-12329ol7_x86_64_olcne11
olcnectl-1.1.10-1.el7.x86_64.rpm15971a9f50e72570f68f824b6dfb9960451cea68556c36a9c13da8ecbef7c076ELSA-2024-12329ol7_x86_64_olcne11



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete