First published: Thu Sep 06 2018(Updated: )
A out of bound write can occur when patching a Openshift object using the 'oc patch' functionality in OpenShift Container Platform 3.6 and earlier. An attacker can use this flaw to cause a denial of service attack on the Openshift master api service which provides cluster management.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/atomic-openshift | <0:3.10.66-1.git.0.91d1e89.el7 | 0:3.10.66-1.git.0.91d1e89.el7 |
redhat/atomic-openshift | <0:3.11.16-1.git.0.b48b8f8.el7 | 0:3.11.16-1.git.0.b48b8f8.el7 |
redhat/atomic-openshift | <0:3.6.173.0.130-1.git.0.8d78a39.el7 | 0:3.6.173.0.130-1.git.0.8d78a39.el7 |
redhat/atomic-openshift | <0:3.7.72-1.git.0.925b9cd.el7 | 0:3.7.72-1.git.0.925b9cd.el7 |
redhat/atomic-openshift | <0:3.9.51-1.git.0.dc3a40b.el7 | 0:3.9.51-1.git.0.dc3a40b.el7 |
Redhat Openshift Container Platform | <=3.7 | |
Redhat Openshift Container Platform | =3.9 | |
Redhat Openshift Container Platform | =3.10 | |
Redhat Openshift Container Platform | =3.11 | |
Starcounter-Jack JSON-Patch |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)