Headline
GHSA-j8gh-87rx-c7w9: OpenShift Controller Manager Improper Privilege Management
A flaw was found in OpenShift. This issue occurs due to the misuse of elevated privileges in the OpenShift Container Platform’s build process. During the build initialization step, the git-clone container is run with a privileged security context, allowing unrestricted access to the node. An attacker with developer-level access can provide a crafted .gitconfig file containing commands executed during the cloning process, leading to arbitrary command execution on the worker node. An attacker running code in a privileged container could escalate their permissions on the node running the container.
Skip to content
Navigation Menu
Actions
Automate any workflow
Packages
Host and manage packages
Security
Find and fix vulnerabilities
Codespaces
Instant dev environments
GitHub Copilot
Write better code with AI
Code review
Manage code changes
Issues
Plan and track work
Discussions
Collaborate outside of code
Explore
- Learning Pathways
- White papers, Ebooks, Webinars
- Customer Stories
- Partners
GitHub Sponsors
Fund open source developers
* The ReadME Project
GitHub community articles
Enterprise platform
AI-powered developer platform
- Pricing
Provide feedback
Saved searches****Use saved searches to filter your results more quickly
Sign up
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2024-45496
OpenShift Controller Manager Improper Privilege Management
Critical severity GitHub Reviewed Published Sep 17, 2024 to the GitHub Advisory Database • Updated Sep 17, 2024
Package
gomod github.com/openshift/openshift-controller-manager (Go)
Affected versions
< 0.0.0-alpha.0.0.20240911
Patched versions
0.0.0-alpha.0.0.20240911
Description
Published to the GitHub Advisory Database
Sep 17, 2024
Last updated
Sep 17, 2024