OpenShift Container Platform 4 does not sanitize secret data written to pod logs when the log level in a given operator is set to Debug or higher. A low privileged user could read pod logs to discover secret material if the log level has already been modified in an operator by a privileged user. Upstream Fix: https://github.com/openshift/library-go/pull/472
Flaw introduced by: https://github.com/openshift/library-go/pull/244
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.1 Via RHSA-2019:2791 https://access.redhat.com/errata/RHSA-2019:2791
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-10213
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.1 Via RHSA-2019:4082 https://access.redhat.com/errata/RHSA-2019:4082
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.1 Via RHSA-2019:4088 https://access.redhat.com/errata/RHSA-2019:4088