First published: Thu Mar 08 2018(Updated: )
GlusterFS and NFS network filesystems rely on File System User ID and Group ID information in order to restrict access to file shares. However it's possible to overwrite the Openshift restrictions on container UserId and GroupdId as they are not validated before being sent over the Openshift Networking. An attacker could use the flaw to read and write any data on the network filesystem.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift | =3.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1069 has been classified with a medium severity level due to its potential impact on file share access controls.
To fix CVE-2018-1069, you should update to the latest patched version of Red Hat OpenShift that addresses this vulnerability.
CVE-2018-1069 affects Red Hat OpenShift version 3.7, specifically related to GlusterFS and NFS filesystems.
The implications of CVE-2018-1069 include the risk of unauthorized access to file shares due to the failure to validate user IDs and group IDs.
While the primary recommendation is to apply the update, additional security measures such as restricting network access may serve as a temporary workaround for CVE-2018-1069.