First published: Thu May 17 2018(Updated: )
source-to-image component of Openshift Container Platform before versions atomic-openshift 3.7.53, atomic-openshift 3.9.31 is vulnerable to a privilege escalation which allows the assemble script to run as the root user in a non-privileged container. An attacker can use this flaw to open network connections, and possibly other actions, on the host which are normally only available to a root user.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/atomic-openshift | <3.7.53 | 3.7.53 |
redhat/atomic-openshift | <3.9.31 | 3.9.31 |
Redhat Openshift Container Platform | <3.7.53 | |
Redhat Openshift Container Platform | =3.9 | |
Redhat Openshift Container Platform | =3.9.31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.