Vulnerability Description
Red Hat OpenShift Enterprise 3.2, when multi-tenant SDN is enabled and a build is run in a namespace that would normally be isolated from pods in other namespaces, allows remote authenticated users to access network resources on restricted pods via an s2i build with a builder image that (1) contains ONBUILD commands or (2) does not contain a tar binary.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Openshift | 3.2 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2016:1094Vendor Advisory
- https://access.redhat.com/errata/RHSA-2016:1094Vendor Advisory
FAQ
What is CVE-2016-3708?
CVE-2016-3708 is a vulnerability with a CVSS score of 7.1 (HIGH). Red Hat OpenShift Enterprise 3.2, when multi-tenant SDN is enabled and a build is run in a namespace that would normally be isolated from pods in other namespaces, allows remote authenticated users to...
How severe is CVE-2016-3708?
CVE-2016-3708 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-3708?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Openshift.