8.8
CWE
552
Advisory Published
CVE Published
CVE Published
Updated

CVE-2021-20182

First published: Tue Jan 12 2021(Updated: )

A privilege escalation flaw was found in openshift4/ose-docker-builder. The build container runs with high privileges using a chrooted environment instead of runc. If an attacker can gain access to this build container, they can potentially utilize the raw devices of the underlying node, such as the network and storage devices, to at least escalate their privileges to that of the cluster admin. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Credit: secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
redhat/github.com/openshift/builder v0.0.0-20210118193943<6
6
Redhat Openshift Container Platform>=4.4<4.4.33
Redhat Openshift Container Platform>=4.5<4.5.30
Redhat Openshift Container Platform>=4.6<4.6.15

Remedy

The affected build strategies include docker, source and custom builds, hence these can be disabled as per the documentation[1]. This does however, exclude the Jenkins build strategy as it is not affected and does not have to be disabled. [1] https://docs.openshift.com/container-platform/4.6/builds/securing-builds-by-strategy.html On clusters where builds are allowed only grant permissions to perform builds to users who you wish to be to able to view, modify and edit all cluster resources.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2021-20182?

    CVE-2021-20182 is a privilege escalation vulnerability found in openshift4/ose-docker-builder, which allows an attacker to gain access to the build container and utilize the raw devices of the underlying node.

  • How does CVE-2021-20182 affect the software?

    CVE-2021-20182 affects the openshift4/ose-docker-builder package version up to exclusive 6, running with high privileges in a chrooted environment instead of runc.

  • What is the severity of CVE-2021-20182?

    CVE-2021-20182 has a severity rating of 8.8 (high).

  • How can I fix CVE-2021-20182?

    To fix CVE-2021-20182, update the openshift4/ose-docker-builder package to version 6 or later.

  • Where can I find more information about CVE-2021-20182?

    More information about CVE-2021-20182 can be found at the following references: - [CVE-2021-20182 - CVE Detail](https://www.cve.org/CVERecord?id=CVE-2021-20182) - [CVE-2021-20182 - NVD](https://nvd.nist.gov/vuln/detail/CVE-2021-20182) - [Bugzilla - Red Hat](https://bugzilla.redhat.com/show_bug.cgi?id=1915110) - [Red Hat Security Advisory - RHSA-2021:0281](https://access.redhat.com/errata/RHSA-2021:0281)

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203