CVE-2021-20182

A privilege escalation flaw was found in openshift4/ose-docker-builder. The build container runs with high privileges using a chrooted environment instead of runc. If an attacker can gain access to this build container, they can potentially utilize the raw devices of the underlying node, such as the network and storage devices, to at least escalate their privileges to that of the cluster admin. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1915110 Issue Tracking Mitigation Patch Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1915110 Issue Tracking Mitigation Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:openshift_container_platform:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:46

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=1915110 - Issue Tracking, Mitigation, Patch, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1915110 - Issue Tracking, Mitigation, Patch, Vendor Advisory

Information

Published : 2021-02-23 22:15

Updated : 2024-11-21 05:46


NVD link : CVE-2021-20182

Mitre link : CVE-2021-20182

CVE.ORG link : CVE-2021-20182


JSON object : View

Products Affected

redhat

  • openshift_container_platform
CWE
CWE-552

Files or Directories Accessible to External Parties