A flaw was found during the upgrade of an existing OpenShift Container Platform 3.x cluster. Using CRI-O, the dockergc service account is assigned to the current namespace of the user performing the upgrade. This flaw can allow an unprivileged user to escalate their privileges to those allowed by the privileged Security Context Constraints.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14819 | Exploit Issue Tracking Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14819 | Exploit Issue Tracking Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14819 - Exploit, Issue Tracking, Third Party Advisory |
Information
Published : 2020-01-07 18:15
Updated : 2024-11-21 04:27
NVD link : CVE-2019-14819
Mitre link : CVE-2019-14819
CVE.ORG link : CVE-2019-14819
JSON object : View
Products Affected
redhat
- openshift_container_platform