It has been found that multiple containers modify the permissions of /etc/passwd to make them modifiable by users other than root. An attacker with access to the running container can exploit this to modify /etc/passwd to add a user and escalate their privileges. This CVE is specific to the openshift/postgresql-apb. Original bug: https://bugzilla.redhat.com/show_bug.cgi?id=1791534
Statement: By default this vulnerability is not exploitable in un-privilieged containers running on OpenShift Container Platform. This is because the system call SETUID and SETGID is blocked by the default seccomp policy.
Acknowledgments: Name: Joseph LaMagna-Reiter (SPR Inc.)
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.2 Via RHSA-2020:0617 https://access.redhat.com/errata/RHSA-2020:0617
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-1707
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.3 Via RHSA-2020:0681 https://access.redhat.com/errata/RHSA-2020:0681
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.1 Via RHSA-2020:0694 https://access.redhat.com/errata/RHSA-2020:0694
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 3.11 Via RHSA-2020:0801 https://access.redhat.com/errata/RHSA-2020:0801