A privilege escalation flaw was found in openshift4/ose-docker-builder. The build container runs with high privileges using a chrooted environment instead of runc. If an attacker can gain access to this build container, they can potentially utilize the raw devices of the underlying node, such as the network and storage devices, to at least escalate their privileges to that of the cluster admin. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1915110 | Issue Tracking Mitigation Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 May 2021, 15:28
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:redhat:openshift_container_platform:4.6:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.5:*:*:*:*:*:*:* |
cpe:2.3:a:redhat:openshift_container_platform:*:*:*:*:*:*:*:* |
Information
Published : 2021-02-23 22:15
Updated : 2024-02-04 21:23
NVD link : CVE-2021-20182
Mitre link : CVE-2021-20182
CVE.ORG link : CVE-2021-20182
JSON object : View
Products Affected
redhat
- openshift_container_platform
CWE
CWE-552
Files or Directories Accessible to External Parties