First published: Mon Sep 23 2019(Updated: )
A vulnerability was found in OpenShift builds. Builds which extract source from a container image bypass TLS hostname verification. An attacker can take advantage of this by launching a man-in-the-middle attack and injecting malicious content. References: <a href="https://github.com/openshift/builder/blob/04c78176099139a5d229578a9a98ed2e1d17a19d/pkg/build/builder/source.go#L383-L385">https://github.com/openshift/builder/blob/04c78176099139a5d229578a9a98ed2e1d17a19d/pkg/build/builder/source.go#L383-L385</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Origin |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1754662 is considered critical due to its potential for man-in-the-middle attacks.
To fix REDHAT-BUG-1754662, update your OpenShift installation to the latest patched version provided by Red Hat.
Attackers can leverage the REDHAT-BUG-1754662 vulnerability to perform man-in-the-middle attacks and inject malicious content.
REDHAT-BUG-1754662 affects Red Hat OpenShift builds that extract source from container images.
The primary issue with REDHAT-BUG-1754662 is that it allows source extraction from container images to bypass TLS hostname verification.