Redhat

Openshift

163 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Published 08.10.2019 19:15:10
  • Last modified 21.11.2024 04:27:29

A vulnerability was found in OpenShift builds, versions 4.1 up to 4.3. Builds that extract source from a container image, bypass the TLS hostname verification. An attacker can take advantage of this flaw by launching a man-in-the-middle attack and in...

  • EPSS 0.11%
  • Published 04.09.2019 16:15:11
  • Last modified 21.11.2024 04:46:52

On version 1.9.0, If DEBUG logging is enable, F5 Container Ingress Service (CIS) for Kubernetes and Red Hat OpenShift (k8s-bigip-ctlr) log files may contain BIG-IP secrets such as SSL Private Keys and Private key Passphrases as provided as inputs by ...

  • EPSS 0.11%
  • Published 01.08.2019 14:15:13
  • Last modified 21.11.2024 04:42:47

A vulnerability exists in the garbage collection mechanism of atomic-openshift. An attacker able spoof the UUID of a valid object from another namespace is able to delete children of those objects. Versions 3.6, 3.7, 3.8, 3.9, 3.10, 3.11 and 4.1 are ...

Exploit
  • EPSS 53.41%
  • Published 11.02.2019 19:29:00
  • Last modified 21.11.2024 04:45:24

runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types ...

  • EPSS 0.23%
  • Published 21.09.2018 13:29:00
  • Last modified 21.11.2024 03:49:29

A flaw was discovered in the HPACK decoder of HAProxy, before 1.8.14, that is used for HTTP/2. An out-of-bounds read access in hpack_valid_idx() resulted in a remote crash and denial of service.

Exploit
  • EPSS 0.29%
  • Published 10.09.2018 14:29:00
  • Last modified 21.11.2024 02:57:24

It was found that Kubernetes as used by Openshift Enterprise 3 did not correctly validate X.509 client intermediate certificate host name fields. An attacker could use this flaw to bypass authentication requirements by using a specially crafted X.509...

  • EPSS 0.24%
  • Published 01.08.2018 16:29:00
  • Last modified 21.11.2024 02:59:46

An input validation flaw was found in the way OpenShift 3 handles requests for images. A user, with a copy of the manifest associated with an image, can pull an image even if they do not have access to the image normally, resulting in the disclosure ...

  • EPSS 0.19%
  • Published 31.07.2018 20:29:00
  • Last modified 21.11.2024 02:59:43

The OpenShift Enterprise 3 router does not properly sort routes when processing newly added routes. An attacker with access to create routes can potentially overwrite existing routes and redirect network traffic for other users to their own site.

  • EPSS 0.17%
  • Published 16.07.2018 20:29:00
  • Last modified 21.11.2024 03:14:08

The OpenShift image import whitelist failed to enforce restrictions correctly when running commands such as "oc tag", for example. This could allow a user with access to OpenShift to run images from registries that should not be allowed.

  • EPSS 0.06%
  • Published 13.07.2018 22:29:00
  • Last modified 21.11.2024 03:42:11

A flaw was found in ansible. ansible.cfg is read from the current working directory which can be altered to make it point to a plugin or a module path under the control of an attacker, thus allowing the attacker to execute arbitrary code.