Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-0229

Опубликовано: 12 янв. 2023
Источник: redhat
CVSS3: 6.3
EPSS Низкий

Описание

A flaw was found in github.com/openshift/apiserver-library-go, used in OpenShift 4.12 and 4.11, that contains an issue that can allow low-privileged users to set the seccomp profile for pods they control to "unconfined." By default, the seccomp profile used in the restricted-v2 Security Context Constraint (SCC) is "runtime/default," allowing users to disable seccomp for pods they can create and modify.

Отчет

This flaw does not affect OpenShift versions 4.10 and earlier.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.11atomic-openshiftNot affected
Red Hat OpenShift Container Platform 4openshift4/ose-openshift-apiserver-rhel9Not affected
Red Hat OpenShift Container Platform 4openshift4/ose-testsNot affected
Red Hat OpenShift Container Platform 4.12microshiftFixedRHBA-2023:103707.03.2023
Red Hat OpenShift Container Platform 4.13openshiftFixedRHSA-2023:132518.05.2023

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=2160349openshift/apiserver-library-go: Bypass of SCC seccomp profile restrictions

EPSS

Процентиль: 25%
0.00086
Низкий

6.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.3
nvd
около 3 лет назад

A flaw was found in github.com/openshift/apiserver-library-go, used in OpenShift 4.12 and 4.11, that contains an issue that can allow low-privileged users to set the seccomp profile for pods they control to "unconfined." By default, the seccomp profile used in the restricted-v2 Security Context Constraint (SCC) is "runtime/default," allowing users to disable seccomp for pods they can create and modify.

CVSS3: 6.3
github
около 3 лет назад

github.com/openshift/apiserver-library-go Improper Input Validation vulnerability

EPSS

Процентиль: 25%
0.00086
Низкий

6.3 Medium

CVSS3