A security issue was discovered in Kubernetes where a user may be able to create a container with subpath volume mounts to access files & directories outside of the volume, including on the host filesystem. Environments where cluster administrators have restricted the ability to create hostPath mounts are the most seriously affected. Exploitation allows hostPath-like access without use of the hostPath feature, thus bypassing the restriction. In a default Kubernetes environment, exploitation could be used to obscure misuse of already-granted privileges.
Upstream issue: https://github.com/kubernetes/kubernetes/issues/104980
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.8 Via RHSA-2021:3631 https://access.redhat.com/errata/RHSA-2021:3631
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-25741
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.6 Via RHSA-2021:3642 https://access.redhat.com/errata/RHSA-2021:3642
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.7 Via RHSA-2021:3635 https://access.redhat.com/errata/RHSA-2021:3635
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 3.11 Via RHSA-2021:3646 https://access.redhat.com/errata/RHSA-2021:3646