An improper signature verification vulnerability was found in coreos-installer. A specially crafted gzip installation image can bypass the image signature verification and as a consequence can lead to the installation of unsigned content. An attacker able to modify the original installation image can write arbitrary data, and achieve full access to the node being installed.
The product does not verify, or incorrectly verifies, the cryptographic signature for data.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Coreos-installer | Redhat | * | 0.10.1 (excluding) |
Red Hat OpenShift Container Platform 4.6 | RedHat | coreos-installer-0:0.6.0-4.rhaos4.6.el8 | * |
Red Hat OpenShift Container Platform 4.7 | RedHat | coreos-installer-0:0.8.0-4.rhaos4.7.el8 | * |
Red Hat OpenShift Container Platform 4.8 | RedHat | coreos-installer-0:0.9.0-7.rhaos4.8.el8 | * |
Red Hat OpenShift Container Platform 4.9 | RedHat | coreos-installer-0:0.10.1-1.rhaos4.9.el8 | * |