Redhat

Openshift Container Platform

274 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.16%
  • Veröffentlicht 11.02.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 05:11:15

A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with a...

  • EPSS 0.11%
  • Veröffentlicht 07.02.2020 21:15:10
  • Zuletzt bearbeitet 21.11.2024 05:11:12

It has been found in openshift-enterprise version 3.11 and all openshift-enterprise versions from 4.1 to, including 4.3, that multiple containers modify the permissions of /etc/passwd to make them modifiable by users other than root. An attacker with...

Exploit
  • EPSS 0.36%
  • Veröffentlicht 07.01.2020 18:15:10
  • Zuletzt bearbeitet 21.11.2024 04:27:25

A flaw was found during the upgrade of an existing OpenShift Container Platform 3.x cluster. Using CRI-O, the dockergc service account is assigned to the current namespace of the user performing the upgrade. This flaw can allow an unprivileged user t...

Exploit
  • EPSS 0.36%
  • Veröffentlicht 07.01.2020 17:15:11
  • Zuletzt bearbeitet 21.11.2024 04:27:30

OpenShift Container Platform 4 does not sanitize secret data written to static pod logs when the log level in a given operator is set to Debug or higher. A low privileged user could read pod logs to discover secret material if the log level has alrea...

  • EPSS 4.68%
  • Veröffentlicht 10.12.2019 22:15:13
  • Zuletzt bearbeitet 21.11.2024 04:25:36

Out of bounds write in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

  • EPSS 0.7%
  • Veröffentlicht 05.12.2019 16:15:10
  • Zuletzt bearbeitet 21.11.2024 04:20:48

Improper input validation in Kubernetes CSI sidecar containers for external-provisioner (<v0.4.3, <v1.0.2, v1.1, <v1.2.2, <v1.3.1), external-snapshotter (<v0.4.2, <v1.0.2, v1.1, <1.2.2), and external-resizer (v0.1, v0.2) could result in unauthorized ...

  • EPSS 0.45%
  • Veröffentlicht 25.11.2019 15:15:27
  • Zuletzt bearbeitet 21.11.2024 04:18:40

OpenShift Container Platform, versions 4.1 and 4.2, does not sanitize secret data written to pod logs when the log level in a given operator is set to Debug or higher. A low privileged user could read pod logs to discover secret material if the log l...

  • EPSS 0.32%
  • Veröffentlicht 25.11.2019 11:15:11
  • Zuletzt bearbeitet 21.11.2024 04:18:40

The containers/image library used by the container tools Podman, Buildah, and Skopeo in Red Hat Enterprise Linux version 8 and CRI-O in OpenShift Container Platform, does not enforce TLS connections to the container registry authorization service. An...

  • EPSS 0.32%
  • Veröffentlicht 25.11.2019 11:15:11
  • Zuletzt bearbeitet 21.11.2024 04:27:37

A flaw was found in cri-o, as a result of all pod-related processes being placed in the same memory cgroup. This can result in container management (conmon) processes being killed if a workload process triggers an out-of-memory (OOM) condition for th...

  • EPSS 0.26%
  • Veröffentlicht 14.11.2019 20:15:11
  • Zuletzt bearbeitet 21.11.2024 03:44:45

Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.