{
  "threat_severity" : "Important",
  "public_date" : "2018-03-12T00:00:00Z",
  "bugzilla" : {
    "description" : "kubernetes: Volume security can be sidestepped with innocent emptyDir and subpath",
    "id" : "1525130",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1525130"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.2",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "details" : [ "In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host's filesystem.", "It was found that volume security can be sidestepped with innocent emptyDir and subpath. This could give an attacker with access to a pod full control over the node host by gaining access to docker socket." ],
  "statement" : "This flaw allows a pod to mount any part of the host filesystem. The pod will run with the security contraints placed on the user but could read anything with o=rx mode and appropriate SELinux label.",
  "affected_release" : [ {
    "product_name" : "Red Hat OpenShift Container Platform 3.3",
    "release_date" : "2018-03-12T00:00:00Z",
    "advisory" : "RHSA-2018:0475",
    "cpe" : "cpe:/a:redhat:openshift:3.3::el7",
    "package" : "atomic-openshift-0:3.3.1.46.11-1.git.4.e236015.el7",
    "impact" : "important"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 3.4",
    "release_date" : "2018-03-12T00:00:00Z",
    "advisory" : "RHSA-2018:0475",
    "cpe" : "cpe:/a:redhat:openshift:3.4::el7",
    "package" : "atomic-openshift-0:3.4.1.44.38-1.git.4.bb8df08.el7",
    "impact" : "important"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 3.5",
    "release_date" : "2018-03-12T00:00:00Z",
    "advisory" : "RHSA-2018:0475",
    "cpe" : "cpe:/a:redhat:openshift:3.5::el7",
    "package" : "atomic-openshift-0:3.5.5.31.48-1.git.4.ff6153e.el7",
    "impact" : "important"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 3.6",
    "release_date" : "2018-03-12T00:00:00Z",
    "advisory" : "RHSA-2018:0475",
    "cpe" : "cpe:/a:redhat:openshift:3.6::el7",
    "package" : "atomic-openshift-0:3.6.173.0.96-1.git.4.e6301f8.el7",
    "impact" : "important"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 3.7",
    "release_date" : "2018-03-12T00:00:00Z",
    "advisory" : "RHSA-2018:0475",
    "cpe" : "cpe:/a:redhat:openshift:3.7::el7",
    "package" : "atomic-openshift-0:3.7.23-1.git.5.83efd71.el7",
    "impact" : "important"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Will not fix",
    "package_name" : "kubernetes",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "impact" : "important"
  }, {
    "product_name" : "Red Hat Storage 3",
    "fix_state" : "Not affected",
    "package_name" : "heketi",
    "cpe" : "cpe:/a:redhat:storage:3"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2017-1002101\nhttps://nvd.nist.gov/vuln/detail/CVE-2017-1002101\nhttps://github.com/kubernetes/kubernetes/issues/60813" ],
  "name" : "CVE-2017-1002101",
  "csaw" : false
}