It has been found that multiple containers modify the permissions of /etc/passwd to make them modifiable by users other than root. An attacker with access to the running container can exploit this to modify /etc/passwd to add a user and escalate their privileges. This CVE is specific to the openshift/istio-kiali-rhel7-operator-container.
By default this vulnerability is not exploitable in un-privilieged containers running on OpenShift Container Platform. This is because the system call SETUID and SETGID is blocked by the default seccomp policy.
Name: Joseph LaMagna-Reiter (SPR Inc.)
This issue has been addressed in the following products:
Openshift Service Mesh 1.1
Via RHSA-2020:2369 https://access.redhat.com/errata/RHSA-2020:2369
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):