An out of bound write can occur when patching an Openshift object using the 'oc patch' functionality in OpenShift Container Platform before 3.7. An attacker can use this flaw to cause a denial of service attack on the Openshift master api service which provides cluster management.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 03:49
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/errata/RHBA-2018:2652 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:2654 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:2709 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:2906 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:2908 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14632 - Issue Tracking, Patch, Vendor Advisory | |
References | () https://github.com/evanphx/json-patch/commit/4c9aadca8f89e349c999f04e28199e96e81aba03#diff-65c563bba473be9d94ce4d033f74810e - Patch, Third Party Advisory |
Information
Published : 2018-09-06 14:29
Updated : 2024-11-21 03:49
NVD link : CVE-2018-14632
Mitre link : CVE-2018-14632
CVE.ORG link : CVE-2018-14632
JSON object : View
Products Affected
starcounter-jack
- json-patch
redhat
- openshift_container_platform
CWE
CWE-787
Out-of-bounds Write