It has been found that multiple containers modify the permissions of /etc/passwd to make them modifiable by users other than root. An attacker with access to the running container can exploit this to modify /etc/passwd to add a user and escalate their privileges. This CVE is specific to the openshift/istio-kiali-rhel7-operator-container. Original bug: https://bugzilla.redhat.com/show_bug.cgi?id=1791534
Statement: By default this vulnerability is not exploitable in un-privilieged containers running on OpenShift Container Platform. This is because the system call SETUID and SETGID is blocked by the default seccomp policy.
Acknowledgments: Name: Joseph LaMagna-Reiter (SPR Inc.)
This issue has been addressed in the following products: Openshift Service Mesh 1.1 Via RHSA-2020:2369 https://access.redhat.com/errata/RHSA-2020:2369
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-1704