Risk | High |
Patch available | YES |
Number of vulnerabilities | 9 |
CVE-ID | CVE-2023-44487 CVE-2023-39325 CVE-2023-39326 CVE-2023-45287 CVE-2023-48795 CVE-2023-40225 CVE-2023-47108 CVE-2023-6476 CVE-2024-21626 |
CWE-ID | CWE-400 CWE-203 CWE-326 CWE-444 CWE-264 CWE-254 |
Exploitation vector | Network |
Public exploit |
Vulnerability #1 is being exploited in the wild. Public exploit code for vulnerability #5 is available. Public exploit code for vulnerability #9 is available. |
Vulnerable software |
Red Hat OpenShift Container Platform Client/Desktop applications / Software for system administration toolbox (Red Hat package) Operating systems & Components / Operating system package or component skopeo (Red Hat package) Operating systems & Components / Operating system package or component rust-bootupd (Red Hat package) Operating systems & Components / Operating system package or component rust-afterburn (Red Hat package) Operating systems & Components / Operating system package or component runc (Red Hat package) Operating systems & Components / Operating system package or component rpm-ostree (Red Hat package) Operating systems & Components / Operating system package or component podman (Red Hat package) Operating systems & Components / Operating system package or component ostree (Red Hat package) Operating systems & Components / Operating system package or component ose-aws-ecr-image-credential-provider (Red Hat package) Operating systems & Components / Operating system package or component openshift-clients (Red Hat package) Operating systems & Components / Operating system package or component openshift-ansible (Red Hat package) Operating systems & Components / Operating system package or component openshift (Red Hat package) Operating systems & Components / Operating system package or component ignition (Red Hat package) Operating systems & Components / Operating system package or component crun (Red Hat package) Operating systems & Components / Operating system package or component cri-tools (Red Hat package) Operating systems & Components / Operating system package or component cri-o (Red Hat package) Operating systems & Components / Operating system package or component coreos-installer (Red Hat package) Operating systems & Components / Operating system package or component container-selinux (Red Hat package) Operating systems & Components / Operating system package or component conmon (Red Hat package) Operating systems & Components / Operating system package or component buildah (Red Hat package) Operating systems & Components / Operating system package or component kernel-rt (Red Hat package) Operating systems & Components / Operating system package or component kernel (Red Hat package) Operating systems & Components / Operating system package or component |
Vendor | Red Hat Inc. |
Security Bulletin
This security bulletin contains information about 9 vulnerabilities.
EUVDB-ID: #VU81728
Risk: High
CVSSv4.0: 6.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A/U:Amber]
CVE-ID: CVE-2023-44487
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improperly control of consumption for internal resources when handling HTTP/2 requests with compressed HEADERS frames. A remote attacker can send a sequence of compressed HEADERS frames followed by RST_STREAM frames and perform a denial of service (DoS) attack, a.k.a. "Rapid Reset".
Note, the vulnerability is being actively exploited in the wild.
Install updates from vendor's website.
Red Hat OpenShift Container Platform: before 4.15.0
toolbox (Red Hat package): before 0.1.2-1.rhaos4.15.el9
skopeo (Red Hat package): before 1.11.2-21.1.rhaos4.15.el9
rust-bootupd (Red Hat package): before 0.2.17-1.el9
rust-afterburn (Red Hat package): before 5.4.3-2.rhaos4.15.el9
runc (Red Hat package): before 1.1.12-1.rhaos4.15.el9
rpm-ostree (Red Hat package): before 2024.2-1.el9
podman (Red Hat package): before 4.4.1-21.rhaos4.15.el9
ostree (Red Hat package): before 2023.8-3.el9
ose-aws-ecr-image-credential-provider (Red Hat package): before 4.15.0-202401231232.p0.gba252ab.assembly.stream.el9
openshift-clients (Red Hat package): before 4.15.0-202402070507.p0.g48dcf59.assembly.stream.el9
openshift-ansible (Red Hat package): before 4.15.0-202402162207.p0.g1c9b99e.assembly.stream.el9
openshift (Red Hat package): before 4.15.0-202402142009.p0.g6216ea1.assembly.stream.el9
ignition (Red Hat package): before 2.16.2-2.rhaos4.15.el9
crun (Red Hat package): before 1.14-1.rhaos4.15.el9
cri-tools (Red Hat package): before 1.28.0-3.el9
cri-o (Red Hat package): before 1.28.3-14.rhaos4.15.git33aabd8.el9
coreos-installer (Red Hat package): before 0.17.0-3.rhaos4.15.el9
container-selinux (Red Hat package): before 2.228.1-1.rhaos4.15.el9
conmon (Red Hat package): before 2.1.7-1.2.rhaos4.14.el9
buildah (Red Hat package): before 1.29.1-20.2.rhaos4.15.el9
kernel-rt (Red Hat package): before 5.14.0-284.54.1.rt14.339.el9_2
kernel (Red Hat package): before 5.14.0-284.54.1.el9_2
CPE2.3https://access.redhat.com/errata/RHSA-2023:7201
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.
EUVDB-ID: #VU82064
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-39325
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to excessive consumption of internal resources when handling HTTP/2 requests. A remote attacker can bypass the http2.Server.MaxConcurrentStreams setting by creating new connections while the current connections are still being processed, trigger resource exhaustion and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Red Hat OpenShift Container Platform: before 4.15.0
toolbox (Red Hat package): before 0.1.2-1.rhaos4.15.el9
skopeo (Red Hat package): before 1.11.2-21.1.rhaos4.15.el9
rust-bootupd (Red Hat package): before 0.2.17-1.el9
rust-afterburn (Red Hat package): before 5.4.3-2.rhaos4.15.el9
runc (Red Hat package): before 1.1.12-1.rhaos4.15.el9
rpm-ostree (Red Hat package): before 2024.2-1.el9
podman (Red Hat package): before 4.4.1-21.rhaos4.15.el9
ostree (Red Hat package): before 2023.8-3.el9
ose-aws-ecr-image-credential-provider (Red Hat package): before 4.15.0-202401231232.p0.gba252ab.assembly.stream.el9
openshift-clients (Red Hat package): before 4.15.0-202402070507.p0.g48dcf59.assembly.stream.el9
openshift-ansible (Red Hat package): before 4.15.0-202402162207.p0.g1c9b99e.assembly.stream.el9
openshift (Red Hat package): before 4.15.0-202402142009.p0.g6216ea1.assembly.stream.el9
ignition (Red Hat package): before 2.16.2-2.rhaos4.15.el9
crun (Red Hat package): before 1.14-1.rhaos4.15.el9
cri-tools (Red Hat package): before 1.28.0-3.el9
cri-o (Red Hat package): before 1.28.3-14.rhaos4.15.git33aabd8.el9
coreos-installer (Red Hat package): before 0.17.0-3.rhaos4.15.el9
container-selinux (Red Hat package): before 2.228.1-1.rhaos4.15.el9
conmon (Red Hat package): before 2.1.7-1.2.rhaos4.14.el9
buildah (Red Hat package): before 1.29.1-20.2.rhaos4.15.el9
kernel-rt (Red Hat package): before 5.14.0-284.54.1.rt14.339.el9_2
kernel (Red Hat package): before 5.14.0-284.54.1.el9_2
CPE2.3https://access.redhat.com/errata/RHSA-2023:7201
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU83928
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-39326
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources when handling HTTP chunked requests. A remote attacker can send specially crafted HTTP requests to the server and consume excessive memory resources.
MitigationInstall updates from vendor's website.
Red Hat OpenShift Container Platform: before 4.15.0
toolbox (Red Hat package): before 0.1.2-1.rhaos4.15.el9
skopeo (Red Hat package): before 1.11.2-21.1.rhaos4.15.el9
rust-bootupd (Red Hat package): before 0.2.17-1.el9
rust-afterburn (Red Hat package): before 5.4.3-2.rhaos4.15.el9
runc (Red Hat package): before 1.1.12-1.rhaos4.15.el9
rpm-ostree (Red Hat package): before 2024.2-1.el9
podman (Red Hat package): before 4.4.1-21.rhaos4.15.el9
ostree (Red Hat package): before 2023.8-3.el9
ose-aws-ecr-image-credential-provider (Red Hat package): before 4.15.0-202401231232.p0.gba252ab.assembly.stream.el9
openshift-clients (Red Hat package): before 4.15.0-202402070507.p0.g48dcf59.assembly.stream.el9
openshift-ansible (Red Hat package): before 4.15.0-202402162207.p0.g1c9b99e.assembly.stream.el9
openshift (Red Hat package): before 4.15.0-202402142009.p0.g6216ea1.assembly.stream.el9
ignition (Red Hat package): before 2.16.2-2.rhaos4.15.el9
crun (Red Hat package): before 1.14-1.rhaos4.15.el9
cri-tools (Red Hat package): before 1.28.0-3.el9
cri-o (Red Hat package): before 1.28.3-14.rhaos4.15.git33aabd8.el9
coreos-installer (Red Hat package): before 0.17.0-3.rhaos4.15.el9
container-selinux (Red Hat package): before 2.228.1-1.rhaos4.15.el9
conmon (Red Hat package): before 2.1.7-1.2.rhaos4.14.el9
buildah (Red Hat package): before 1.29.1-20.2.rhaos4.15.el9
kernel-rt (Red Hat package): before 5.14.0-284.54.1.rt14.339.el9_2
kernel (Red Hat package): before 5.14.0-284.54.1.el9_2
CPE2.3https://access.redhat.com/errata/RHSA-2023:7201
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU86309
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-45287
CWE-ID:
CWE-203 - Observable discrepancy
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to a timing discrepancy when handling RSA based TLS key exchanges. A remote attacker can perform a Marvin attack and gain access to sensitive information.
Install updates from vendor's website.
Red Hat OpenShift Container Platform: before 4.15.0
toolbox (Red Hat package): before 0.1.2-1.rhaos4.15.el9
skopeo (Red Hat package): before 1.11.2-21.1.rhaos4.15.el9
rust-bootupd (Red Hat package): before 0.2.17-1.el9
rust-afterburn (Red Hat package): before 5.4.3-2.rhaos4.15.el9
runc (Red Hat package): before 1.1.12-1.rhaos4.15.el9
rpm-ostree (Red Hat package): before 2024.2-1.el9
podman (Red Hat package): before 4.4.1-21.rhaos4.15.el9
ostree (Red Hat package): before 2023.8-3.el9
ose-aws-ecr-image-credential-provider (Red Hat package): before 4.15.0-202401231232.p0.gba252ab.assembly.stream.el9
openshift-clients (Red Hat package): before 4.15.0-202402070507.p0.g48dcf59.assembly.stream.el9
openshift-ansible (Red Hat package): before 4.15.0-202402162207.p0.g1c9b99e.assembly.stream.el9
openshift (Red Hat package): before 4.15.0-202402142009.p0.g6216ea1.assembly.stream.el9
ignition (Red Hat package): before 2.16.2-2.rhaos4.15.el9
crun (Red Hat package): before 1.14-1.rhaos4.15.el9
cri-tools (Red Hat package): before 1.28.0-3.el9
cri-o (Red Hat package): before 1.28.3-14.rhaos4.15.git33aabd8.el9
coreos-installer (Red Hat package): before 0.17.0-3.rhaos4.15.el9
container-selinux (Red Hat package): before 2.228.1-1.rhaos4.15.el9
conmon (Red Hat package): before 2.1.7-1.2.rhaos4.14.el9
buildah (Red Hat package): before 1.29.1-20.2.rhaos4.15.el9
kernel-rt (Red Hat package): before 5.14.0-284.54.1.rt14.339.el9_2
kernel (Red Hat package): before 5.14.0-284.54.1.el9_2
CPE2.3https://access.redhat.com/errata/RHSA-2023:7201
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU84537
Risk: Low
CVSSv4.0: 2.9 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2023-48795
CWE-ID:
CWE-326 - Inadequate Encryption Strength
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to perform MitM attack.
The vulnerability exists due to incorrect implementation of the SSH Binary Packet Protocol (BPP), which mishandles the handshake phase and the use of sequence numbers. A remote attacker can perform MitM attack and delete the SSH2_MSG_EXT_INFO message sent before authentication starts, allowing the attacker to disable a subset of the keystroke timing obfuscation features introduced in OpenSSH 9.5.
The vulnerability was dubbed "Terrapin attack" and it affects both client and server implementations.
Install updates from vendor's website.
Red Hat OpenShift Container Platform: before 4.15.0
toolbox (Red Hat package): before 0.1.2-1.rhaos4.15.el9
skopeo (Red Hat package): before 1.11.2-21.1.rhaos4.15.el9
rust-bootupd (Red Hat package): before 0.2.17-1.el9
rust-afterburn (Red Hat package): before 5.4.3-2.rhaos4.15.el9
runc (Red Hat package): before 1.1.12-1.rhaos4.15.el9
rpm-ostree (Red Hat package): before 2024.2-1.el9
podman (Red Hat package): before 4.4.1-21.rhaos4.15.el9
ostree (Red Hat package): before 2023.8-3.el9
ose-aws-ecr-image-credential-provider (Red Hat package): before 4.15.0-202401231232.p0.gba252ab.assembly.stream.el9
openshift-clients (Red Hat package): before 4.15.0-202402070507.p0.g48dcf59.assembly.stream.el9
openshift-ansible (Red Hat package): before 4.15.0-202402162207.p0.g1c9b99e.assembly.stream.el9
openshift (Red Hat package): before 4.15.0-202402142009.p0.g6216ea1.assembly.stream.el9
ignition (Red Hat package): before 2.16.2-2.rhaos4.15.el9
crun (Red Hat package): before 1.14-1.rhaos4.15.el9
cri-tools (Red Hat package): before 1.28.0-3.el9
cri-o (Red Hat package): before 1.28.3-14.rhaos4.15.git33aabd8.el9
coreos-installer (Red Hat package): before 0.17.0-3.rhaos4.15.el9
container-selinux (Red Hat package): before 2.228.1-1.rhaos4.15.el9
conmon (Red Hat package): before 2.1.7-1.2.rhaos4.14.el9
buildah (Red Hat package): before 1.29.1-20.2.rhaos4.15.el9
kernel-rt (Red Hat package): before 5.14.0-284.54.1.rt14.339.el9_2
kernel (Red Hat package): before 5.14.0-284.54.1.el9_2
CPE2.3https://access.redhat.com/errata/RHSA-2023:7201
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU79767
Risk: Medium
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-40225
CWE-ID:
CWE-444 - Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform HTTP request smuggling attacks.
The vulnerability exists due to improper validation of HTTP requests. A remote attacker can send a specially crafted HTTP request with empty Content-Length headers to the server and smuggle arbitrary HTTP headers.
Successful exploitation of vulnerability may allow an attacker to poison HTTP cache and perform phishing attacks.
MitigationInstall updates from vendor's website.
Red Hat OpenShift Container Platform: before 4.15.0
toolbox (Red Hat package): before 0.1.2-1.rhaos4.15.el9
skopeo (Red Hat package): before 1.11.2-21.1.rhaos4.15.el9
rust-bootupd (Red Hat package): before 0.2.17-1.el9
rust-afterburn (Red Hat package): before 5.4.3-2.rhaos4.15.el9
runc (Red Hat package): before 1.1.12-1.rhaos4.15.el9
rpm-ostree (Red Hat package): before 2024.2-1.el9
podman (Red Hat package): before 4.4.1-21.rhaos4.15.el9
ostree (Red Hat package): before 2023.8-3.el9
ose-aws-ecr-image-credential-provider (Red Hat package): before 4.15.0-202401231232.p0.gba252ab.assembly.stream.el9
openshift-clients (Red Hat package): before 4.15.0-202402070507.p0.g48dcf59.assembly.stream.el9
openshift-ansible (Red Hat package): before 4.15.0-202402162207.p0.g1c9b99e.assembly.stream.el9
openshift (Red Hat package): before 4.15.0-202402142009.p0.g6216ea1.assembly.stream.el9
ignition (Red Hat package): before 2.16.2-2.rhaos4.15.el9
crun (Red Hat package): before 1.14-1.rhaos4.15.el9
cri-tools (Red Hat package): before 1.28.0-3.el9
cri-o (Red Hat package): before 1.28.3-14.rhaos4.15.git33aabd8.el9
coreos-installer (Red Hat package): before 0.17.0-3.rhaos4.15.el9
container-selinux (Red Hat package): before 2.228.1-1.rhaos4.15.el9
conmon (Red Hat package): before 2.1.7-1.2.rhaos4.14.el9
buildah (Red Hat package): before 1.29.1-20.2.rhaos4.15.el9
kernel-rt (Red Hat package): before 5.14.0-284.54.1.rt14.339.el9_2
kernel (Red Hat package): before 5.14.0-284.54.1.el9_2
CPE2.3https://access.redhat.com/errata/RHSA-2023:7201
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU84507
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-47108
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to grpc Unary Server Interceptor does not properly control consumption of internal resources when processing multiple requests. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Red Hat OpenShift Container Platform: before 4.15.0
toolbox (Red Hat package): before 0.1.2-1.rhaos4.15.el9
skopeo (Red Hat package): before 1.11.2-21.1.rhaos4.15.el9
rust-bootupd (Red Hat package): before 0.2.17-1.el9
rust-afterburn (Red Hat package): before 5.4.3-2.rhaos4.15.el9
runc (Red Hat package): before 1.1.12-1.rhaos4.15.el9
rpm-ostree (Red Hat package): before 2024.2-1.el9
podman (Red Hat package): before 4.4.1-21.rhaos4.15.el9
ostree (Red Hat package): before 2023.8-3.el9
ose-aws-ecr-image-credential-provider (Red Hat package): before 4.15.0-202401231232.p0.gba252ab.assembly.stream.el9
openshift-clients (Red Hat package): before 4.15.0-202402070507.p0.g48dcf59.assembly.stream.el9
openshift-ansible (Red Hat package): before 4.15.0-202402162207.p0.g1c9b99e.assembly.stream.el9
openshift (Red Hat package): before 4.15.0-202402142009.p0.g6216ea1.assembly.stream.el9
ignition (Red Hat package): before 2.16.2-2.rhaos4.15.el9
crun (Red Hat package): before 1.14-1.rhaos4.15.el9
cri-tools (Red Hat package): before 1.28.0-3.el9
cri-o (Red Hat package): before 1.28.3-14.rhaos4.15.git33aabd8.el9
coreos-installer (Red Hat package): before 0.17.0-3.rhaos4.15.el9
container-selinux (Red Hat package): before 2.228.1-1.rhaos4.15.el9
conmon (Red Hat package): before 2.1.7-1.2.rhaos4.14.el9
buildah (Red Hat package): before 1.29.1-20.2.rhaos4.15.el9
kernel-rt (Red Hat package): before 5.14.0-284.54.1.rt14.339.el9_2
kernel (Red Hat package): before 5.14.0-284.54.1.el9_2
CPE2.3https://access.redhat.com/errata/RHSA-2023:7201
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU85580
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-6476
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to unchecked access to an experimental annotation. A remote user can use the cgroupv2 and perform a denial of service (DoS) attack by consuming all available memory resources.
Install updates from vendor's website.
Red Hat OpenShift Container Platform: before 4.15.0
toolbox (Red Hat package): before 0.1.2-1.rhaos4.15.el9
skopeo (Red Hat package): before 1.11.2-21.1.rhaos4.15.el9
rust-bootupd (Red Hat package): before 0.2.17-1.el9
rust-afterburn (Red Hat package): before 5.4.3-2.rhaos4.15.el9
runc (Red Hat package): before 1.1.12-1.rhaos4.15.el9
rpm-ostree (Red Hat package): before 2024.2-1.el9
podman (Red Hat package): before 4.4.1-21.rhaos4.15.el9
ostree (Red Hat package): before 2023.8-3.el9
ose-aws-ecr-image-credential-provider (Red Hat package): before 4.15.0-202401231232.p0.gba252ab.assembly.stream.el9
openshift-clients (Red Hat package): before 4.15.0-202402070507.p0.g48dcf59.assembly.stream.el9
openshift-ansible (Red Hat package): before 4.15.0-202402162207.p0.g1c9b99e.assembly.stream.el9
openshift (Red Hat package): before 4.15.0-202402142009.p0.g6216ea1.assembly.stream.el9
ignition (Red Hat package): before 2.16.2-2.rhaos4.15.el9
crun (Red Hat package): before 1.14-1.rhaos4.15.el9
cri-tools (Red Hat package): before 1.28.0-3.el9
cri-o (Red Hat package): before 1.28.3-14.rhaos4.15.git33aabd8.el9
coreos-installer (Red Hat package): before 0.17.0-3.rhaos4.15.el9
container-selinux (Red Hat package): before 2.228.1-1.rhaos4.15.el9
conmon (Red Hat package): before 2.1.7-1.2.rhaos4.14.el9
buildah (Red Hat package): before 1.29.1-20.2.rhaos4.15.el9
kernel-rt (Red Hat package): before 5.14.0-284.54.1.rt14.339.el9_2
kernel (Red Hat package): before 5.14.0-284.54.1.el9_2
CPE2.3https://access.redhat.com/errata/RHSA-2023:7201
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU85991
Risk: High
CVSSv4.0: 7.5 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber]
CVE-ID: CVE-2024-21626
CWE-ID:
CWE-254 - Security Features
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to an internal file descriptor leak that can cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace or a malicious image to allow a container process to gain access to the host filesystem through runc run. A remote attacker can trick the victim into loading a malicious image to bypass sandbox restrictions and execute arbitrary code on the host OS.
Install updates from vendor's website.
Red Hat OpenShift Container Platform: before 4.15.0
toolbox (Red Hat package): before 0.1.2-1.rhaos4.15.el9
skopeo (Red Hat package): before 1.11.2-21.1.rhaos4.15.el9
rust-bootupd (Red Hat package): before 0.2.17-1.el9
rust-afterburn (Red Hat package): before 5.4.3-2.rhaos4.15.el9
runc (Red Hat package): before 1.1.12-1.rhaos4.15.el9
rpm-ostree (Red Hat package): before 2024.2-1.el9
podman (Red Hat package): before 4.4.1-21.rhaos4.15.el9
ostree (Red Hat package): before 2023.8-3.el9
ose-aws-ecr-image-credential-provider (Red Hat package): before 4.15.0-202401231232.p0.gba252ab.assembly.stream.el9
openshift-clients (Red Hat package): before 4.15.0-202402070507.p0.g48dcf59.assembly.stream.el9
openshift-ansible (Red Hat package): before 4.15.0-202402162207.p0.g1c9b99e.assembly.stream.el9
openshift (Red Hat package): before 4.15.0-202402142009.p0.g6216ea1.assembly.stream.el9
ignition (Red Hat package): before 2.16.2-2.rhaos4.15.el9
crun (Red Hat package): before 1.14-1.rhaos4.15.el9
cri-tools (Red Hat package): before 1.28.0-3.el9
cri-o (Red Hat package): before 1.28.3-14.rhaos4.15.git33aabd8.el9
coreos-installer (Red Hat package): before 0.17.0-3.rhaos4.15.el9
container-selinux (Red Hat package): before 2.228.1-1.rhaos4.15.el9
conmon (Red Hat package): before 2.1.7-1.2.rhaos4.14.el9
buildah (Red Hat package): before 1.29.1-20.2.rhaos4.15.el9
kernel-rt (Red Hat package): before 5.14.0-284.54.1.rt14.339.el9_2
kernel (Red Hat package): before 5.14.0-284.54.1.el9_2
CPE2.3https://access.redhat.com/errata/RHSA-2023:7201
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.