First published: Thu May 23 2019(Updated: )
It was found that OpenShift Container Platform does not perform SSH Host Key checking when using ssh key authentication during builds. An attacker, with the ability to redirect network traffic, could use this to alter the resulting build output.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/atomic-openshift | <0:3.10.175-1.git.0.f9f0e81.el7 | 0:3.10.175-1.git.0.f9f0e81.el7 |
redhat/cri-o | <0:1.10.6-2.rhaos3.10.git56d7d9a.el7 | 0:1.10.6-2.rhaos3.10.git56d7d9a.el7 |
redhat/atomic-openshift | <0:3.11.153-1.git.0.aaf3f71.el7 | 0:3.11.153-1.git.0.aaf3f71.el7 |
redhat/atomic-openshift | <0:3.9.102-1.git.0.6411f52.el7 | 0:3.9.102-1.git.0.6411f52.el7 |
Redhat Openshift Container Platform | >=3.6<=4.1 |
Use only methods (such as HTTPS with TLS verification) that enable the identity of the remote repository to be validated.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)