First published: Wed Jun 08 2016(Updated: )
Red Hat OpenShift Enterprise 3.2 does not properly restrict access to STI builds, which allows remote authenticated users to access the Docker socket and gain privileges via vectors related to build-pod.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift | =3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3738 has a medium severity rating due to its potential for privilege escalation.
To fix CVE-2016-3738, it is recommended to upgrade to a later version of Red Hat OpenShift Enterprise that addresses this vulnerability.
CVE-2016-3738 affects users of Red Hat OpenShift Enterprise version 3.2.
CVE-2016-3738 is a privilege escalation vulnerability that allows remote authenticated access to sensitive resources.
The potential impacts of CVE-2016-3738 include unauthorized access to the Docker socket and escalation of privileges within the affected system.