Hide Forgot
It has been found that multiple containers modify the permissions of /etc/passwd to make them modifiable by users other than root. An attacker with access to the running container can exploit this to modify /etc/passwd to add a user and escalate their privileges. This CVE is specific to the openshift/mediawiki-container. Original bug: https://bugzilla.redhat.com/show_bug.cgi?id=1791534
Statement: By default this vulnerability is not exploitable in un-privilieged containers running on OpenShift Container Platform. This is because the system call SETUID and SETGID is blocked by the default seccomp policy.
Acknowledgments: Name: Joseph LaMagna-Reiter (SPR Inc.)
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.1 Via RHSA-2020:0694 https://access.redhat.com/errata/RHSA-2020:0694
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-1709
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 3.11 Via RHSA-2020:0799 https://access.redhat.com/errata/RHSA-2020:0799
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.2 Via RHSA-2020:0830 https://access.redhat.com/errata/RHSA-2020:0830