CVE-2017-1002101

Related Vulnerabilities: CVE-2017-1002101  

It was found that volume security can be sidestepped with innocent emptyDir and subpath. This could give an attacker with access to a pod full control over the node host by gaining access to docker socket.

It was found that volume security can be sidestepped with innocent emptyDir and subpath. This could give an attacker with access to a pod full control over the node host by gaining access to docker socket.

Find out more about CVE-2017-1002101 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This flaw allows a pod to mount any part of the host filesystem. The pod will run with the security contraints placed on the user but could read anything with o=rx mode and appropriate SELinux label.

CVSS v3 metrics

CVSS3 Base Score 7.2
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector Network
Attack Complexity Low
Privileges Required High
User Interaction None
Scope Unchanged
Confidentiality High
Integrity Impact High
Availability Impact High

Red Hat Security Errata

Platform Errata Release Date
Red Hat OpenShift Container Platform 3.6 (atomic-openshift) RHSA-2018:0475 2018-03-12
Red Hat OpenShift Container Platform 3.7 (atomic-openshift) RHSA-2018:0475 2018-03-12
Red Hat OpenShift Container Platform 3.4 (atomic-openshift) RHSA-2018:0475 2018-03-12
Red Hat OpenShift Container Platform 3.5 (atomic-openshift) RHSA-2018:0475 2018-03-12
Red Hat OpenShift Container Platform 3.3 (atomic-openshift) RHSA-2018:0475 2018-03-12

Affected Packages State

Platform Package State
Red Hat OpenShift Enterprise 3 Storage Affected
Red Hat Gluster Storage 3 heketi Not affected
Red Hat Enterprise Linux 7 kubernetes Will not fix

External References