First published: Thu May 23 2019(Updated: )
It was found that OpenShift Container Platform does not perform SSH Host Key checking when using ssh key authentication during builds. An attacker, with the ability to redirect network traffic, could use this to alter the resulting build output.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/atomic-openshift | <0:3.10.175-1.git.0.f9f0e81.el7 | 0:3.10.175-1.git.0.f9f0e81.el7 |
redhat/cri-o | <0:1.10.6-2.rhaos3.10.git56d7d9a.el7 | 0:1.10.6-2.rhaos3.10.git56d7d9a.el7 |
redhat/atomic-openshift | <0:3.11.153-1.git.0.aaf3f71.el7 | 0:3.11.153-1.git.0.aaf3f71.el7 |
redhat/atomic-openshift | <0:3.9.102-1.git.0.6411f52.el7 | 0:3.9.102-1.git.0.6411f52.el7 |
Red Hat OpenShift Container Platform | >=3.6<=4.1 |
Use only methods (such as HTTPS with TLS verification) that enable the identity of the remote repository to be validated.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-10150 is considered a critical vulnerability as it allows attackers to manipulate build outputs due to lack of SSH Host Key checking.
To fix CVE-2019-10150, update your OpenShift Container Platform to one of the remediated versions specified in the advisory, such as 3.10.175-1.git.0.f9f0e81.el7 or later.
Versions of OpenShift Container Platform from 3.6 to less than 4.1 are affected by CVE-2019-10150.
An attacker can redirect network traffic to alter the build output of OpenShift Container Platform due to the disabled SSH Host Key checking.
Yes, CVE-2019-10150 specifically affects the Red Hat OpenShift Container Platform and its associated components.