{
  "threat_severity" : "Important",
  "public_date" : "2020-04-21T00:00:00Z",
  "bugzilla" : {
    "description" : "openshift/cluster-image-registry-operator: secrets disclosed in logs",
    "id" : "1825161",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1825161"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.0",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L",
    "status" : "verified"
  },
  "cwe" : "CWE-532",
  "details" : [ "A flaw was found in OpenShift Container Platform version 4.1 and later. Sensitive information was found to be logged by the image registry operator allowing an attacker able to gain access to those logs, to read and write to the storage backing the internal image registry. The highest threat from this vulnerability is to data integrity.", "A flaw was found in OpenShift Container Platform versions from 4.1 to 4.4 inclusive. Sensitive information was found to be logged by the image registry operator allowing an attacker able to gain access to those logs, to read and write to the storage backing the internal image registry. The highest threat from this vulnerability is to data integrity." ],
  "statement" : "References to internal container components making up OpenShift Container Platform 4.x itself all use digests to refer to container images [1]. Therefore any changes to the images in the registry storage will invalidate those references. This issue could allow an attacker to modify other container image content that is referred to by tag however.\n[1] https://www.redhat.com/en/blog/securing-deployment-openshift-container-platform-4",
  "acknowledgement" : "This issue was discovered by Adam Kaplan (Red Hat).",
  "affected_release" : [ {
    "product_name" : "Red Hat OpenShift Container Platform 4.2",
    "release_date" : "2020-05-13T00:00:00Z",
    "advisory" : "RHSA-2020:2026",
    "cpe" : "cpe:/a:redhat:openshift:4.2::el7",
    "package" : "openshift4/ose-cluster-image-registry-operator:v4.2.32-202005050921"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.3",
    "release_date" : "2020-05-12T00:00:00Z",
    "advisory" : "RHSA-2020:2009",
    "cpe" : "cpe:/a:redhat:openshift:4.3::el7",
    "package" : "openshift4/ose-cluster-image-registry-operator:v4.3.19-202005041055"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.4",
    "release_date" : "2020-05-18T00:00:00Z",
    "advisory" : "RHSA-2020:2136",
    "cpe" : "cpe:/a:redhat:openshift:4.4::el7",
    "package" : "openshift4/ose-cluster-image-registry-operator:v4.4.0-202005121717"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2020-10712\nhttps://nvd.nist.gov/vuln/detail/CVE-2020-10712" ],
  "name" : "CVE-2020-10712",
  "mitigation" : {
    "value" : "Ensure that the image registry operator logs remain private.",
    "lang" : "en:us"
  },
  "csaw" : false
}