May 16, 2019 | by Dave Baker
Earlier this week, details were made public about four CVEs related to microprocessor flaws that impact systems hosting Red Hat OpenShift Online (Starter and Pro) and Red Hat OpenShift Dedicated. Some organizations are referring to these as “Fallout”, “ZombieLoad”, “RIDL”, or collectively as MDS (Microarchitectural Data Sampling). Read additional technical details at these links (CVE-2018-12127, CVE-2018-12126, CVE-2018-11091 and CVE-2018-12130), and a more general explanation here.
The purpose of this blog is to notify our customers, and the community, of the actions Red Hat and the OpenShift SRE team have taken to patch and protect OpenShift Online and OpenShift Dedicated services.
Timeline:
Any questions about the vulnerabilities or patches should be directed to Red Hat Support.
At Red Hat, the safety and security of our customers’ software and data is of utmost importance. Thank you for your continued trust and confidence in working with Red Hat.
This page will be updated with additional information as it becomes available.
Red Hat OpenShift SRE Team
Categories
February 25, 2021
February 24, 2021
February 24, 2021