Redhat

Openshift Container Platform

272 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.19%
  • Veröffentlicht 22.04.2020 16:15:12
  • Zuletzt bearbeitet 21.11.2024 04:55:54

A flaw was found in OpenShift Container Platform version 4.1 and later. Sensitive information was found to be logged by the image registry operator allowing an attacker able to gain access to those logs, to read and write to the storage backing the i...

  • EPSS 75.55%
  • Veröffentlicht 02.04.2020 15:15:17
  • Zuletzt bearbeitet 21.11.2024 04:56:47

In hpack_dht_insert in hpack-tbl.c in the HPACK decoder in HAProxy 1.8 through 2.x before 2.1.4, a remote attacker can write arbitrary bytes around a certain location on the heap via a crafted HTTP/2 request, possibly causing remote code execution.

Exploit
  • EPSS 0.87%
  • Veröffentlicht 31.03.2020 22:15:14
  • Zuletzt bearbeitet 21.11.2024 04:55:52

A path traversal flaw was found in Buildah in versions before 1.14.5. This flaw allows an attacker to trick a user into building a malicious container image hosted on an HTTP(s) server and then write files to the user's system anywhere that the user ...

  • EPSS 0.11%
  • Veröffentlicht 31.03.2020 17:15:26
  • Zuletzt bearbeitet 21.11.2024 05:11:13

A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially...

  • EPSS 0.09%
  • Veröffentlicht 09.03.2020 16:15:12
  • Zuletzt bearbeitet 21.11.2024 05:11:12

It has been found that in openshift-enterprise version 3.11 and openshift-enterprise versions 4.1 up to, including 4.3, multiple containers modify the permissions of /etc/passwd to make them modifiable by users other than root. An attacker with acces...

  • EPSS 0.87%
  • Veröffentlicht 02.03.2020 17:15:17
  • Zuletzt bearbeitet 21.11.2024 04:27:37

A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to ex...

Exploit
  • EPSS 3.03%
  • Veröffentlicht 12.02.2020 18:15:10
  • Zuletzt bearbeitet 21.11.2024 05:39:42

The proglottis Go wrapper before 0.1.1 for the GPGME library has a use-after-free, as demonstrated by use for container image pulls by Docker or CRI-O. This leads to a crash or potential code execution during GPG signature verification.

  • EPSS 0.24%
  • Veröffentlicht 12.02.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 04:35:40

runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able t...

  • EPSS 0.16%
  • Veröffentlicht 11.02.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 05:11:15

A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with a...

  • EPSS 0.11%
  • Veröffentlicht 07.02.2020 21:15:10
  • Zuletzt bearbeitet 21.11.2024 05:11:12

It has been found in openshift-enterprise version 3.11 and all openshift-enterprise versions from 4.1 to, including 4.3, that multiple containers modify the permissions of /etc/passwd to make them modifiable by users other than root. An attacker with...