First published: Thu Jan 12 2023(Updated: )
A flaw was found in github.com/openshift/apiserver-library-go, used in OpenShift 4.12 and 4.11, that contains an issue that can allow low-privileged users to set the seccomp profile for pods they control to "unconfined." By default, the seccomp profile used in the restricted-v2 Security Context Constraint (SCC) is "runtime/default," allowing users to disable seccomp for pods they can create and modify.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/microshift | <0:4.12.6-202303012057.p0.g50997a2.assembly.4.12.6.el8 | 0:4.12.6-202303012057.p0.g50997a2.assembly.4.12.6.el8 |
redhat/openshift | <0:4.13.0-202304211155.p0.gb404935.assembly.stream.el9 | 0:4.13.0-202304211155.p0.gb404935.assembly.stream.el9 |
Redhat Openshift | =4.11 | |
Redhat Openshift | =4.12 | |
go/github.com/openshift/apiserver-library-go | <0.0.0-20230120221150-cefee9e0162b | 0.0.0-20230120221150-cefee9e0162b |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0229 is a vulnerability found in github.com/openshift/apiserver-library-go used in OpenShift 4.12 and 4.11 that allows low-privileged users to set the seccomp profile for pods they control to "unconfined."
OpenShift 4.12 and 4.11 are affected by CVE-2023-0229.
CVE-2023-0229 has a severity rating of 6.3, which is considered medium.
Low-privileged users can exploit CVE-2023-0229 by setting the seccomp profile for pods they control to "unconfined."
You can find more information about CVE-2023-0229 in the following references: https://www.cve.org/CVERecord?id=CVE-2023-0229, https://nvd.nist.gov/vuln/detail/CVE-2023-0229, https://bugzilla.redhat.com/show_bug.cgi?id=2160349, https://access.redhat.com/errata/RHBA-2023:1037