What Red Hat OpenShift Online and OpenShift Dedicated Customers Should Know About the June 2019 Kernel Network Stack Flaws
June 19, 2019 | by
On Monday, June 17, 2019, details were made public about security flaws that impact systems hosting Red Hat OpenShift Online (Starter and Pro) and Red Hat OpenShift Dedicated. For information on the CVEs, visit CVE-2019-11477, CVE-2019-11478, and CVE-2019-11479. The vulnerability article can be found here.
The intent of this blog is to notify our customers and the community of the actions Red Hat and the OpenShift SRE team have taken to patch and protect OpenShift Online and OpenShift Dedicated services.
Prior to the public announcement, OpenShift SRE initiated mitigation of the most severe of the flaws
On June 17, 2019, at approximately 17:00 (UTC), Netflix publicly announced the details of the flaws and remediations
Shortly thereafter, OpenShift SRE initiated remediation on clusters
Remediation is in-progress, based on the preferred maintenance time-zones for each customer
Any questions about the vulnerabilities or patches should be directed to Red Hat Support.
At Red Hat, the safety and security of our customers’ software and data is of utmost importance. Thank you for your continued trust and confidence in working with us.
This page will be updated with additional information as it becomes available.
References: "Sealed Secrets" for Kubernetes Kubernetes External Secrets GitOps is the way to do Kubernetes or OpenShift cluster management through declarative management of API manifests (yaml files) ...