First published: Thu Mar 03 2016(Updated: )
OpenShift Enterprise by Red Hat is the company's cloud computing<br>Platform-as-a-Service (PaaS) solution designed for on-premise or <br>private cloud deployments.<br>An authorization flaw was discovered in Kubernetes; the API server did <br>not properly check user permissions when handling certain requests. An<br>authenticated remote attacker could use this flaw to gain additional <br>access to resources such as RAM and disk space. (CVE-2016-1905)<br>An authorization flaw was discovered in Kubernetes; the API server did <br>not properly check user permissions when handling certain build<br>configuration strategies. A remote attacker could create build <br>configurations with strategies that violate policy. Although the attacker could not launch the build themselves (launch fails when the <br>policy is violated), if the build configuration files were later <br>launched by other privileged services (such as automated triggers), <br>user privileges could be bypassed allowing attacker escalation. <br>(CVE-2016-1906)<br>All OpenShift Enterprise 3.0 users are advised to upgrade to these <br>updated packages.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openshift | <3.0.2.0-0.git.45.423f434.el7 | 3.0.2.0-0.git.45.423f434.el7 |
redhat/openshift-clients | <3.0.2.0-0.git.45.423f434.el7 | 3.0.2.0-0.git.45.423f434.el7 |
redhat/openshift-master | <3.0.2.0-0.git.45.423f434.el7 | 3.0.2.0-0.git.45.423f434.el7 |
redhat/openshift-node | <3.0.2.0-0.git.45.423f434.el7 | 3.0.2.0-0.git.45.423f434.el7 |
redhat/openshift-sdn-ovs | <3.0.2.0-0.git.45.423f434.el7 | 3.0.2.0-0.git.45.423f434.el7 |
redhat/tuned-profiles-openshift-node | <3.0.2.0-0.git.45.423f434.el7 | 3.0.2.0-0.git.45.423f434.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.