First published: Mon Jul 13 2020(Updated: )
A flaw was found in the Restricted Security Context Constraints (SCC), where it allows pods to craft custom network packets. This flaw allows an attacker to cause a denial of service attack on an OpenShift Container Platform cluster if they can deploy pods. The highest threat from this vulnerability is to system availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Container Platform | =3.11 | |
Red Hat OpenShift Container Platform | =4.5.16 | |
Red Hat OpenShift Container Platform | =4.6 |
On OCP 3.11 create a custom SCC based on 'restricted' and also drop the NET_RAW capability[1]. Assign this custom SCC to any users, or groups which create pods you want to protect. See the documentation for more information [2]. [1] https://access.redhat.com/solutions/5611521 [2] https://docs.openshift.com/container-platform/3.11/admin_guide/manage_scc.html
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14336 has been classified with a high severity level due to its potential to enable denial of service attacks.
To mitigate CVE-2020-14336, it is recommended to apply the latest patches provided by Red Hat for affected OpenShift Container Platform versions.
CVE-2020-14336 affects Red Hat OpenShift Container Platform versions 3.11, 4.5.16, and 4.6.
CVE-2020-14336 allows attackers to craft custom network packets leading to potential denial of service attacks on the OpenShift cluster.
CVE-2020-14336 specifically impacts OpenShift Container Platform environments where pods can be deployed.