Redhat Openshift vulnerabilities
136 known vulnerabilities affecting redhat/openshift.
Total CVEs
136
CISA KEV
1
actively exploited
Public exploits
3
Exploited in wild
1
Severity breakdown
CRITICAL9HIGH52MEDIUM64LOW11
Vulnerabilities
Page 1 of 7
CVE-2026-35091HIGHCVSS 8.2v4.02026-04-01
CVE-2026-35091 [HIGH] CWE-253 CVE-2026-35091: A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vul
A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vulnerability in the Corosync membership commit token sanity check by sending a specially crafted User Datagram Protocol (UDP) packet. This can lead to an out-of-bounds read, causing a denial of service (DoS) and potentially disclosing limited memory conte
nvd
CVE-2026-35092HIGHCVSS 7.5v4.02026-04-01
CVE-2026-35092 [HIGH] CWE-190 CVE-2026-35092: A flaw was found in Corosync. An integer overflow vulnerability in Corosync's join message sanity va
A flaw was found in Corosync. An integer overflow vulnerability in Corosync's join message sanity validation allows a remote, unauthenticated attacker to send crafted User Datagram Protocol (UDP) packets. This can cause the service to crash, leading to a denial of service. This vulnerability specifically affects Corosync deployments configured to use
nvd
CVE-2025-14512MEDIUMCVSS 6.5v4.02025-12-11
CVE-2025-14512 [MEDIUM] CWE-190 CVE-2025-14512: A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (Do
A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib's GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.
nvd
CVE-2024-45777MEDIUMCVSS 6.7v4.02025-02-19
CVE-2024-45777 [MEDIUM] CWE-787 CVE-2024-45777: A flaw was found in grub2. The calculation of the translation buffer when reading a language .mo fil
A flaw was found in grub2. The calculation of the translation buffer when reading a language .mo file in grub_gettext_getstr_from_position() may overflow, leading to a Out-of-bound write. This issue can be leveraged by an attacker to overwrite grub2's sensitive heap data, eventually leading to the circumvention of secure boot protections.
nvd
CVE-2024-12085HIGHCVSS 7.5v5.02025-01-14
CVE-2024-12085 [HIGH] CWE-908 CVE-2024-12085: A flaw was found in rsync which could be triggered when rsync compares file checksums. This flaw all
A flaw was found in rsync which could be triggered when rsync compares file checksums. This flaw allows an attacker to manipulate the checksum length (s2length) to cause a comparison between a checksum and uninitialized memory and leak one byte of uninitialized stack data at a time.
nvd
CVE-2024-1485CRITICALCVSS 9.3v4.02024-02-14
CVE-2024-1485 [HIGH] CWE-22 CVE-2024-1485: A flaw was found in the decompression function of registry-support. This issue can be triggered if a
A flaw was found in the decompression function of registry-support. This issue can be triggered if an unauthenticated remote attacker tricks a user into parsing a devfile which uses the `parent` or `plugin` keywords. This could download a malicious archive and cause the cleanup process to overwrite or delete files outside of the archive, which should not
nvd
CVE-2023-0229MEDIUMCVSS 6.3v4.11v4.122023-01-26
CVE-2023-0229 [MEDIUM] CWE-20 CVE-2023-0229: A flaw was found in github.com/openshift/apiserver-library-go, used in OpenShift 4.12 and 4.11, that
A flaw was found in github.com/openshift/apiserver-library-go, used in OpenShift 4.12 and 4.11, that contains an issue that can allow low-privileged users to set the seccomp profile for pods they control to "unconfined." By default, the seccomp profile used in the restricted-v2 Security Context Constraint (SCC) is "runtime/default," allowing users to d
nvd
CVE-2023-0296MEDIUMCVSS 5.3v4.112023-01-17
CVE-2023-0296 [MEDIUM] CVE-2023-0296: The Birthday attack against 64-bit block ciphers flaw (CVE-2016-2183) was reported for the health ch
The Birthday attack against 64-bit block ciphers flaw (CVE-2016-2183) was reported for the health checks port (9979) on etcd grpc-proxy component. Even though the CVE-2016-2183 has been fixed in the etcd components, to enable periodic health checks from kubelet, it was necessary to open up a new port (9979) on etcd grpc-proxy, hence this port might be conside
nvd
CVE-2022-3259HIGHCVSS 7.4v4.92022-12-09
CVE-2022-3259 [HIGH] CWE-665 CVE-2022-3259: Openshift 4.9 does not use HTTP Strict Transport Security (HSTS) which may allow man-in-the-middle (
Openshift 4.9 does not use HTTP Strict Transport Security (HSTS) which may allow man-in-the-middle (MITM) attacks.
nvd
CVE-2022-3262HIGHCVSS 8.1v4.92022-12-08
CVE-2022-3262 [HIGH] CWE-453 CVE-2022-3262: A flaw was found in Openshift. A pod with a DNSPolicy of "ClusterFirst" may incorrectly resolve the
A flaw was found in Openshift. A pod with a DNSPolicy of "ClusterFirst" may incorrectly resolve the hostname based on a service provided. This flaw allows an attacker to supply an incorrect name with the DNS search policy, affecting confidentiality and availability.
nvd
CVE-2022-3260MEDIUMCVSS 4.8v4.92022-12-08
CVE-2022-3260 [MEDIUM] CWE-1021 CVE-2022-3260: The response header has not enabled X-FRAME-OPTIONS, Which helps prevents against Clickjacking attac
The response header has not enabled X-FRAME-OPTIONS, Which helps prevents against Clickjacking attack.. Some browsers would interpret these results incorrectly, allowing clickjacking attacks.
nvd
CVE-2013-4253HIGHCVSS 7.5v1.02022-10-19
CVE-2013-4253 [HIGH] CWE-377 CVE-2013-4253: The deployment script in the unsupported "OpenShift Extras" set of add-on scripts, in Red Hat Opensh
The deployment script in the unsupported "OpenShift Extras" set of add-on scripts, in Red Hat Openshift 1, installs a default public key in the root user's authorized_keys file.
nvd
CVE-2013-4281MEDIUMCVSS 5.5v1.02022-10-19
CVE-2013-4281 [MEDIUM] CWE-276 CVE-2013-4281: In Red Hat Openshift 1, weak default permissions are applied to the /etc/openshift/server_priv.pem f
In Red Hat Openshift 1, weak default permissions are applied to the /etc/openshift/server_priv.pem file on the broker server, which could allow users with local access to the broker to read this file.
nvd
CVE-2017-7517LOWCVSS 3.5v3.02022-10-17
CVE-2017-7517 [LOW] CWE-20 CVE-2017-7517: An input validation vulnerability exists in Openshift Enterprise due to a 1:1 mapping of tenants in
An input validation vulnerability exists in Openshift Enterprise due to a 1:1 mapping of tenants in Hawkular Metrics and projects/namespaces in OpenShift. If a user creates a project called "MyProject", and then later deletes it another user can then create a project called "MyProject" and access the metrics stored from the original "MyProject" instance.
nvd
CVE-2022-2403MEDIUMCVSS 6.5≥ 4.92022-09-01
CVE-2022-2403 [MEDIUM] CWE-497 CVE-2022-2403: A credentials leak was found in the OpenShift Container Platform. The private key for the external c
A credentials leak was found in the OpenShift Container Platform. The private key for the external cluster certificate was stored incorrectly in the oauth-serving-cert ConfigMaps, and accessible to any authenticated OpenShift user or service-account. A malicious user could exploit this flaw by reading the oauth-serving-cert ConfigMap in the openshift-
nvd
CVE-2021-4125HIGHCVSS 8.1≥ 4.6.0, < 4.6.52≥ 4.7.0, < 4.7.40+1 more2022-08-24
CVE-2021-4125 [HIGH] CWE-20 CVE-2021-4125: It was found that the original fix for log4j CVE-2021-44228 and CVE-2021-45046 in the OpenShift mete
It was found that the original fix for log4j CVE-2021-44228 and CVE-2021-45046 in the OpenShift metering hive containers was incomplete, as not all JndiLookup.class files were removed. This CVE only applies to the OpenShift Metering hive container images, shipped in OpenShift 4.8, 4.7 and 4.6.
nvd
CVE-2021-3697HIGHCVSS 7.0v3.02022-07-06
CVE-2021-3697 [HIGH] CWE-787 CVE-2021-3697: A crafted JPEG image may lead the JPEG reader to underflow its data pointer, allowing user-controlle
A crafted JPEG image may lead the JPEG reader to underflow its data pointer, allowing user-controlled data to be written in heap. To a successful to be performed the attacker needs to perform some triage over the heap layout and craft an image with a malicious format and payload. This vulnerability can lead to data corruption and eventual code execution
nvd
CVE-2021-3695MEDIUMCVSS 4.5v3.02022-07-06
CVE-2021-3695 [MEDIUM] CWE-787 CVE-2021-3695: A crafted 16-bit grayscale PNG image may lead to a out-of-bounds write in the heap area. An attacker
A crafted 16-bit grayscale PNG image may lead to a out-of-bounds write in the heap area. An attacker may take advantage of that to cause heap data corruption or eventually arbitrary code execution and circumvent secure boot protections. This issue has a high complexity to be exploited as an attacker needs to perform some triage over the heap layout to
nvd
CVE-2021-3696MEDIUMCVSS 4.5v3.02022-07-06
CVE-2021-3696 [MEDIUM] CWE-787 CVE-2021-3696: A heap out-of-bounds write may heppen during the handling of Huffman tables in the PNG reader. This
A heap out-of-bounds write may heppen during the handling of Huffman tables in the PNG reader. This may lead to data corruption in the heap space. Confidentiality, Integrity and Availablity impact may be considered Low as it's very complex to an attacker control the encoding and positioning of corrupted Huffman entries to achieve results such as arbitr
nvd
CVE-2021-4047HIGHCVSS 7.5v4.92022-04-11
CVE-2021-4047 [HIGH] CVE-2021-4047: The release of OpenShift 4.9.6 included four CVE fixes for the haproxy package, however the patch fo
The release of OpenShift 4.9.6 included four CVE fixes for the haproxy package, however the patch for CVE-2021-39242 was missing. This issue only affects Red Hat OpenShift 4.9.
nvd
1 / 7Next →