No advisories yet.
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Tue, 28 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 28 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in the OpenShift Container Platform build system. A user with the `edit` ClusterRole can inject arbitrary environment variables, such as `LD_PRELOAD` or `http_proxy`, into `docker-build` containers through the `buildconfigs/instantiate` API. This incomplete fix for a previous vulnerability allows for information disclosure, specifically impacting the confidentiality of build traffic. | |
| Title | Openshift-controller-manager: openshift container platform: information disclosure via environment variable injection | |
| First Time appeared |
Redhat
Redhat openshift |
|
| Weaknesses | CWE-426 | |
| CPEs | cpe:/a:redhat:openshift:4 | |
| Vendors & Products |
Redhat
Redhat openshift |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-04-28T13:32:18.056Z
Reserved: 2026-04-28T12:24:35.368Z
Link: CVE-2026-7309
Updated: 2026-04-28T13:32:14.883Z
Status : Awaiting Analysis
Published: 2026-04-28T13:19:24.847
Modified: 2026-04-28T20:23:20.703
Link: CVE-2026-7309
No data.
OpenCVE Enrichment
Updated: 2026-04-28T19:30:27Z