Redhat

Openshift Container Platform

279 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 18.12.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:21:49

User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila, resulting in potential privilege escalation. An Open Stack Manila user can request access to a share to an arbitrary cephx user, including existing users. ...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 15.12.2020 17:15:14
  • Zuletzt bearbeitet 21.11.2024 05:21:48

A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use...

  • EPSS 9.89%
  • Veröffentlicht 11.12.2020 05:15:12
  • Zuletzt bearbeitet 21.11.2024 05:21:49

A flaw was found in the Linux kernel’s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and be...

  • EPSS 0.17%
  • Veröffentlicht 02.12.2020 01:15:12
  • Zuletzt bearbeitet 21.11.2024 05:21:52

The elasticsearch-operator does not validate the namespace where kibana logging resource is created and due to that it is possible to replace the original openshift-logging console link (kibana console) to different one, created based on the new CR f...

  • EPSS 0.05%
  • Veröffentlicht 24.11.2020 17:15:10
  • Zuletzt bearbeitet 21.11.2024 04:56:01

An information-disclosure flaw was found in the way Heketi before 10.1.0 logs sensitive information. This flaw allows an attacker with local access to the Heketi server to read potentially sensitive information such as gluster-block passwords.

  • EPSS 0.27%
  • Veröffentlicht 23.11.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 05:18:23

A flaw was found in the Cephx authentication protocol in versions before 15.2.6 and before 14.2.14, where it does not verify Ceph clients correctly and is then vulnerable to replay attacks in Nautilus. This flaw allows an attacker with access to the ...

  • EPSS 0.18%
  • Veröffentlicht 23.09.2020 13:15:15
  • Zuletzt bearbeitet 21.11.2024 05:03:06

An information disclosure vulnerability was found in containers/podman in versions before 2.0.5. When using the deprecated Varlink API or the Docker-compatible REST API, if multiple containers are created in a short duration, the environment variable...

  • EPSS 0.03%
  • Veröffentlicht 29.07.2020 18:15:14
  • Zuletzt bearbeitet 21.11.2024 05:06:03

GRUB2 fails to validate kernel signature when booted directly without shim, allowing secure boot to be bypassed. This only affects systems where the kernel signing certificate has been imported directly into the secure boot database and the GRUB imag...

  • EPSS 0.05%
  • Veröffentlicht 29.07.2020 18:15:14
  • Zuletzt bearbeitet 21.11.2024 05:06:03

GRUB2 contains a race condition in grub_script_function_create() leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing, leading to arbitrary code execution and secure b...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 29.07.2020 18:15:14
  • Zuletzt bearbeitet 21.11.2024 05:06:04

Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffe...