CVE-2019-14819

A flaw was found during the upgrade of an existing OpenShift Container Platform 3.x cluster. Using CRI-O, the dockergc service account is assigned to the current namespace of the user performing the upgrade. This flaw can allow an unprivileged user to escalate their privileges to those allowed by the privileged Security Context Constraints.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14819 Exploit Issue Tracking Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14819 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:openshift_container_platform:3.10:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*

History

21 Nov 2024, 04:27

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14819 - Exploit, Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14819 - Exploit, Issue Tracking, Third Party Advisory

Information

Published : 2020-01-07 18:15

Updated : 2024-11-21 04:27


NVD link : CVE-2019-14819

Mitre link : CVE-2019-14819

CVE.ORG link : CVE-2019-14819


JSON object : View

Products Affected

redhat

  • openshift_container_platform
CWE
CWE-266

Incorrect Privilege Assignment

CWE-270

Privilege Context Switching Error

CWE-269

Improper Privilege Management