Known Vulnerabilities for Openshift Container Platform by Redhat

Listed below are 10 of the newest known vulnerabilities associated with "Openshift Container Platform" by "Redhat".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2023-3089 A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabl... Not Provided 2023-07-05 2023-07-05
CVE-2022-3466 The version of cri-o as released for Red Hat OpenShift Container Platform 4.9.48, 4.10.31, and 4.11.6 via RHBA-2022:6316, RHB... Not Provided 2023-09-15 2023-09-15
CVE-2022-0532 An incorrect sysctls validation vulnerability was found in CRI-O 1.18 and earlier. The sysctls from the list of "safe" sysctl... 4.2 - MEDIUM 2022-02-09 2022-02-22
CVE-2021-3684 A vulnerability was found in OpenShift Assisted Installer. During generation of the Discovery ISO, image pull secrets were le... 5.5 - MEDIUM 2023-03-24 2023-04-03
CVE-2021-3669 A flaw was found in the Linux kernel. Measuring usage of the shared memory does not scale with large shared memory segment co... 5.5 - MEDIUM 2022-08-26 2023-07-07
CVE-2021-3631 A flaw was found in libvirt while it generates SELinux MCS category pairs for VMs' dynamic labels. This flaw allows one explo... 6.3 - MEDIUM 2022-03-02 2022-10-28
CVE-2021-3609 .A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN ... 7 - HIGH 2022-03-03 2023-08-11
CVE-2021-3578 A flaw was found in mbsync before v1.3.6 and v1.4.2, where an unchecked pointer cast allows a malicious or compromised server... 7.8 - HIGH 2022-02-16 2022-10-18
CVE-2021-3560 It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges o... 7.8 - HIGH 2022-02-16 2023-06-12
CVE-2021-3529 A flaw was found in noobaa-core in versions before 5.7.0. This flaw results in the name of an arbitrarily URL being copied in... 7.1 - HIGH 2021-06-02 2021-06-15

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationRedhatOpenshift Container Platform4.3AllAllAll
ApplicationRedhatOpenshift Container Platform4.2AllAllAll
ApplicationRedhatOpenshift Container Platform4.1.3AllAllAll
ApplicationRedhatOpenshift Container Platform4.1AllAllAll
ApplicationRedhatOpenshift Container Platform4.0AllAllAll
ApplicationRedhatOpenshift Container Platform3.9.31AllAllAll
ApplicationRedhatOpenshift Container Platform3.9AllAllAll
ApplicationRedhatOpenshift Container Platform3.8AllAllAll
ApplicationRedhatOpenshift Container Platform3.7.61AllAllAll
ApplicationRedhatOpenshift Container Platform3.7.57AllAllAll
ApplicationRedhatOpenshift Container Platform3.7.54AllAllAll
ApplicationRedhatOpenshift Container Platform3.7.53AllAllAll
ApplicationRedhatOpenshift Container Platform3.7.52AllAllAll
ApplicationRedhatOpenshift Container Platform3.7.46AllAllAll
ApplicationRedhatOpenshift Container Platform3.7.44AllAllAll
ApplicationRedhatOpenshift Container Platform3.7.42-2AllAllAll
ApplicationRedhatOpenshift Container Platform3.7.23AllAllAll
ApplicationRedhatOpenshift Container Platform3.7.14AllAllAll
ApplicationRedhatOpenshift Container Platform3.7AllAllAll
ApplicationRedhatOpenshift Container Platform3.6AllAllAll

Popular searches for Openshift Container Platform

OpenShift Container Platform - Red Hat OpenShift

www.openshift.com/products/container-platform

OpenShift Container Platform - Red Hat OpenShift OpenShift Container Platform Kubernetes environments, whether theyre on-premise or in the public cloud, giving teams freedom to build and run applications anywhere.

www.openshift.com/products/container-platform/?hsLang=en-us www.openshift.com/container-platform www.openshift.com/products/enterprise enterprise.openshift.com www.openshift.com/container-platform/index.html enterprise.openshift.com/features/whats-new.html enterprise.openshift.com/trial.html enterprise.openshift.com/middleware-services OpenShift Kubernetes Computing platform Cloud computing Application software Computer cluster Red Hat Collection (abstract data type) On-premises software Enterprise software Container (abstract data type) Red Hat Enterprise Linux Push-button Software build Forrester Research Digital container format Software deployment Application lifecycle management Installation (computer programs) Multicloud

Red Hat OpenShift, the open hybrid cloud platform built on Kubernetes

www.openshift.com

I ERed Hat OpenShift, the open hybrid cloud platform built on Kubernetes Red Hat OpenShift Kubernetes container S Q O orchestrator for enterprise app development and deployment in the hybrid cloud

coreos.com coreos.com coreos.com/operators coreos.com/rkt www.coreos.com openshift.redhat.com/app coreos.com/clair coreos.com/docs coreos.com/flannel OpenShift Cloud computing Kubernetes Red Hat Open-source software Software deployment Computing platform Enterprise software Digital container format Mobile app development Orchestration (computing) Collection (abstract data type) Software build Amazon Web Services Information technology Open source Customer success Application lifecycle management Container (abstract data type) Poste italiane

© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report