First published: Thu Mar 03 2016(Updated: )
OpenShift Enterprise by Red Hat is the company's cloud computing<br>Platform-as-a-Service (PaaS) solution designed for on-premise or <br>private cloud deployments.<br>An authorization flaw was discovered in Kubernetes; the API server did <br>not properly check user permissions when handling certain requests. An<br>authenticated remote attacker could use this flaw to gain additional <br>access to resources such as RAM and disk space. (CVE-2016-1905)<br>An authorization flaw was discovered in Kubernetes; the API server did <br>not properly check user permissions when handling certain build<br>configuration strategies. A remote attacker could create build <br>configurations with strategies that violate policy. Although the attacker could not launch the build themselves (launch fails when the <br>policy is violated), if the build configuration files were later <br>launched by other privileged services (such as automated triggers), <br>user privileges could be bypassed allowing attacker escalation. <br>(CVE-2016-1906)<br>All OpenShift Enterprise 3.0 users are advised to upgrade to these <br>updated packages.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openshift | <3.0.2.0-0.git.45.423f434.el7 | 3.0.2.0-0.git.45.423f434.el7 |
redhat/openshift-clients | <3.0.2.0-0.git.45.423f434.el7 | 3.0.2.0-0.git.45.423f434.el7 |
redhat/openshift-master | <3.0.2.0-0.git.45.423f434.el7 | 3.0.2.0-0.git.45.423f434.el7 |
redhat/openshift-node | <3.0.2.0-0.git.45.423f434.el7 | 3.0.2.0-0.git.45.423f434.el7 |
redhat/openshift-sdn-ovs | <3.0.2.0-0.git.45.423f434.el7 | 3.0.2.0-0.git.45.423f434.el7 |
redhat/tuned-profiles-openshift-node | <3.0.2.0-0.git.45.423f434.el7 | 3.0.2.0-0.git.45.423f434.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2016:0351 is classified as moderate due to the potential for unauthorized access.
To fix RHSA-2016:0351, upgrade your affected OpenShift packages to version 3.0.2.0-0.git.45.423f434.el7.
RHSA-2016:0351 affects multiple OpenShift packages including openshift, openshift-clients, openshift-master, openshift-node, and others.
RHSA-2016:0351 addresses an authorization flaw in Kubernetes that impacts API server user permissions.
While the primary solution is to upgrade to the specified version, implementing strict access controls can help mitigate risks from RHSA-2016:0351.