A flaw was found during the upgrade of an existing OpenShift Container Platform 3.x cluster. Using CRI-O, the dockergc service account is assigned to the current namespace of the user performing the upgrade. This flaw can allow an unprivileged user to escalate their privileges to those allowed by the privileged Security Context Constraints.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T00:26:39.118Z
Reserved: 2019-08-10T00:00:00
Link: CVE-2019-14819

No data.

Status : Modified
Published: 2020-01-07T18:15:10.783
Modified: 2024-11-21T04:27:25.750
Link: CVE-2019-14819
