Total vulnerabilities in the database
It was found that Kubernetes as used by Openshift Enterprise 3 did not correctly validate X.509 client intermediate certificate host name fields. An attacker could use this flaw to bypass authentication requirements by using a specially crafted X.509 certificate.
Software | From | Fixed in |
---|---|---|
redhat / openshift | 3.1 | 3.1.x |
redhat / openshift | 3.2 | 3.2.x |
redhat / openshift | 3.3 | 3.3.x |