Описание
A flaw was found in the OpenShift build process, where the docker-build container is configured with a hostPath volume mount that maps the node's /var/lib/kubelet/config.json file into the build pod. This file contains sensitive credentials necessary for pulling images from private repositories. The mount is not read-only, which allows the attacker to overwrite it. By modifying the config.json file, the attacker can cause a denial of service by preventing the node from pulling new images and potentially exfiltrating sensitive secrets. This flaw impacts the availability of services dependent on image pulls and exposes sensitive information to unauthorized parties.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Fuse 7 | org.arquillian.cube/arquillian-cube-openshift-api | Out of support scope | ||
| Red Hat OpenShift Container Platform 4 | openshift4/ose-openshift-apiserver-rhel9 | Not affected | ||
| Red Hat OpenShift Container Platform 4 | openshift4/ose-openshift-controller-manager-rhel9 | Affected | ||
| Red Hat OpenShift Container Platform 4.12 | openshift4/ose-cluster-openshift-apiserver-operator | Fixed | RHSA-2025:10270 | 10.07.2025 |
| Red Hat OpenShift Container Platform 4.13 | openshift4/ose-cluster-openshift-apiserver-operator | Fixed | RHSA-2025:10747 | 17.07.2025 |
| Red Hat OpenShift Container Platform 4.14 | openshift4/ose-cluster-openshift-apiserver-operator | Fixed | RHSA-2025:9759 | 02.07.2025 |
| Red Hat OpenShift Container Platform 4.16 | openshift4/ose-cluster-openshift-apiserver-rhel9-operator | Fixed | RHSA-2025:9765 | 02.07.2025 |
| Red Hat OpenShift Container Platform 4.17 | openshift4/ose-cluster-openshift-apiserver-rhel9-operator | Fixed | RHSA-2025:10294 | 09.07.2025 |
| Red Hat OpenShift Container Platform 4.18 | openshift4/ose-cluster-openshift-apiserver-rhel9-operator | Fixed | RHSA-2025:9269 | 26.06.2025 |
Показывать по
Дополнительная информация
Статус:
EPSS
7.6 High
CVSS3
Связанные уязвимости
A flaw was found in the OpenShift build process, where the docker-build container is configured with a hostPath volume mount that maps the node's /var/lib/kubelet/config.json file into the build pod. This file contains sensitive credentials necessary for pulling images from private repositories. The mount is not read-only, which allows the attacker to overwrite it. By modifying the config.json file, the attacker can cause a denial of service by preventing the node from pulling new images and potentially exfiltrating sensitive secrets. This flaw impacts the availability of services dependent on image pulls and exposes sensitive information to unauthorized parties.
A flaw was found in the OpenShift build process, where the docker-build container is configured with a hostPath volume mount that maps the node's /var/lib/kubelet/config.json file into the build pod. This file contains sensitive credentials necessary for pulling images from private repositories. The mount is not read-only, which allows the attacker to overwrite it. By modifying the config.json file, the attacker can cause a denial of service by preventing the node from pulling new images and potentially exfiltrating sensitive secrets. This flaw impacts the availability of services dependent on image pulls and exposes sensitive information to unauthorized parties.
EPSS
7.6 High
CVSS3