Redhat

Openshift Container Platform

279 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.11%
  • Veröffentlicht 31.03.2020 17:15:26
  • Zuletzt bearbeitet 21.11.2024 05:11:13

A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially...

  • EPSS 0.09%
  • Veröffentlicht 09.03.2020 16:15:12
  • Zuletzt bearbeitet 21.11.2024 05:11:12

It has been found that in openshift-enterprise version 3.11 and openshift-enterprise versions 4.1 up to, including 4.3, multiple containers modify the permissions of /etc/passwd to make them modifiable by users other than root. An attacker with acces...

  • EPSS 0.87%
  • Veröffentlicht 02.03.2020 17:15:17
  • Zuletzt bearbeitet 21.11.2024 04:27:37

A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to ex...

Exploit
  • EPSS 1.94%
  • Veröffentlicht 12.02.2020 18:15:10
  • Zuletzt bearbeitet 21.11.2024 05:39:42

The proglottis Go wrapper before 0.1.1 for the GPGME library has a use-after-free, as demonstrated by use for container image pulls by Docker or CRI-O. This leads to a crash or potential code execution during GPG signature verification.

  • EPSS 0.13%
  • Veröffentlicht 12.02.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 04:35:40

runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able t...

  • EPSS 0.16%
  • Veröffentlicht 11.02.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 05:11:15

A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with a...

  • EPSS 0.11%
  • Veröffentlicht 07.02.2020 21:15:10
  • Zuletzt bearbeitet 21.11.2024 05:11:12

It has been found in openshift-enterprise version 3.11 and all openshift-enterprise versions from 4.1 to, including 4.3, that multiple containers modify the permissions of /etc/passwd to make them modifiable by users other than root. An attacker with...

Exploit
  • EPSS 0.28%
  • Veröffentlicht 07.01.2020 18:15:10
  • Zuletzt bearbeitet 21.11.2024 04:27:25

A flaw was found during the upgrade of an existing OpenShift Container Platform 3.x cluster. Using CRI-O, the dockergc service account is assigned to the current namespace of the user performing the upgrade. This flaw can allow an unprivileged user t...

Exploit
  • EPSS 0.36%
  • Veröffentlicht 07.01.2020 17:15:11
  • Zuletzt bearbeitet 21.11.2024 04:27:30

OpenShift Container Platform 4 does not sanitize secret data written to static pod logs when the log level in a given operator is set to Debug or higher. A low privileged user could read pod logs to discover secret material if the log level has alrea...

  • EPSS 5.9%
  • Veröffentlicht 10.12.2019 22:15:13
  • Zuletzt bearbeitet 21.11.2024 04:25:36

Out of bounds write in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.