{
  "threat_severity" : "Moderate",
  "public_date" : "2023-01-12T00:00:00Z",
  "bugzilla" : {
    "description" : "openshift/apiserver-library-go: Bypass of SCC seccomp profile restrictions",
    "id" : "2160349",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2160349"
  },
  "cvss3" : {
    "cvss3_base_score" : "6.3",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
    "status" : "verified"
  },
  "cwe" : "CWE-20",
  "details" : [ "A flaw was found in github.com/openshift/apiserver-library-go, used in OpenShift 4.12 and 4.11, that contains an issue that can allow low-privileged users to set the seccomp profile for pods they control to \"unconfined.\" By default, the seccomp profile used in the restricted-v2 Security Context Constraint (SCC) is \"runtime/default,\" allowing users to disable seccomp for pods they can create and modify.", "A flaw was found in github.com/openshift/apiserver-library-go, used in OpenShift 4.12 and 4.11, that contains an issue that can allow low-privileged users to set the seccomp profile for pods they control to \"unconfined.\" By default, the seccomp profile used in the restricted-v2 Security Context Constraint (SCC) is \"runtime/default,\" allowing users to disable seccomp for pods they can create and modify." ],
  "statement" : "This flaw does not affect OpenShift versions 4.10 and earlier.",
  "affected_release" : [ {
    "product_name" : "Red Hat OpenShift Container Platform 4.12",
    "release_date" : "2023-03-07T00:00:00Z",
    "advisory" : "RHBA-2023:1037",
    "cpe" : "cpe:/a:redhat:openshift:4.12::el8",
    "package" : "microshift-0:4.12.6-202303012057.p0.g50997a2.assembly.4.12.6.el8"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.13",
    "release_date" : "2023-05-18T00:00:00Z",
    "advisory" : "RHSA-2023:1325",
    "cpe" : "cpe:/a:redhat:openshift:4.13::el8",
    "package" : "openshift-0:4.13.0-202304211155.p0.gb404935.assembly.stream.el8"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat OpenShift Container Platform 3.11",
    "fix_state" : "Not affected",
    "package_name" : "atomic-openshift",
    "cpe" : "cpe:/a:redhat:openshift:3.11"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4",
    "fix_state" : "Not affected",
    "package_name" : "openshift4/ose-openshift-apiserver-rhel8",
    "cpe" : "cpe:/a:redhat:openshift:4"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4",
    "fix_state" : "Not affected",
    "package_name" : "openshift4/ose-tests",
    "cpe" : "cpe:/a:redhat:openshift:4"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2023-0229\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-0229\nhttps://github.com/advisories/GHSA-5465-xc2j-6p84" ],
  "name" : "CVE-2023-0229",
  "csaw" : false
}