Uploaded image for project: 'OpenShift Bugs'
  1. OpenShift Bugs
  2. OCPBUGS-44919

vulenarabilities found with RODO 1.0.2

XMLWordPrintable

    • Icon: Bug Bug
    • Resolution: Done
    • Icon: Undefined Undefined
    • None
    • 4.13
    • None
    • Quality / Stability / Reliability
    • False
    • Hide

      None

      Show
      None
    • None
    • Moderate
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None

      Description of problem:

      when dast scan was run on the RODO operator we did some vulenrabilites that were reported.
      
      "Container 'runoncedurationoverride' of Pod 'runoncedurationoverride-hptcv' should set 'securityContext.readOnlyRootFilesystem' to true"
          

      Version-Release number of selected component (if applicable):

           [knarra@knarra-thinkpadx1carbon7th ~]$ oc get csv -n openshift-run-once-duration-override-operator
      NAME                                     DISPLAY                               VERSION   REPLACES                                 PHASE
      runoncedurationoverrideoperator.v1.0.2   Run Once Duration Override Operator   1.0.2     runoncedurationoverrideoperator.v1.0.1   Succeeded
      
          

      How reproducible:

           Always
          

      Steps to Reproduce:

          1. Install 1.0.2 RODO operator
          2. Run DAST scan using rapidast
          3.
          

      Actual results:

          Vulnerabilities put up in the description are seen
          

      Expected results:

          vulnerabilities related to readOnlyRootFilesystem should not be seen.
          

      Additional info:

      
          

              aos-workloads-staff Workloads Team Bot Account
              knarra@redhat.com Rama Kasturi Narra
              None
              None
              Rama Kasturi Narra Rama Kasturi Narra
              None
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

                Created:
                Updated:
                Resolved: