OpenShift Container Platform, versions 4.1 and 4.2, does not sanitize secret data written to pod logs when the log level in a given operator is set to Debug or higher. A low privileged user could read pod logs to discover secret material if the log level has already been modified in an operator by a privileged user.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2019:4082 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2019:4088 | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10213 | Issue Tracking Patch Vendor Advisory |
https://access.redhat.com/errata/RHSA-2019:4082 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2019:4088 | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10213 | Issue Tracking Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/errata/RHSA-2019:4082 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2019:4088 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10213 - Issue Tracking, Patch, Vendor Advisory |
Information
Published : 2019-11-25 15:15
Updated : 2024-11-21 04:18
NVD link : CVE-2019-10213
Mitre link : CVE-2019-10213
CVE.ORG link : CVE-2019-10213
JSON object : View
Products Affected
redhat
- enterprise_linux
- openshift_container_platform