SB2024040359 - Multiple vulnerabilities in Red Hat OpenShift Container Platform 4.15



SB2024040359 - Multiple vulnerabilities in Red Hat OpenShift Container Platform 4.15

Published: April 3, 2024

Security Bulletin ID SB2024040359
Severity
High
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

High 25% Medium 50% Low 25%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Infinite loop (CVE-ID: CVE-2024-24786)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop when parsing data in an invalid JSON format within the protojson.Unmarshal() function. A remote attacker can consume all available system resources and cause denial of service conditions.


2) Integer underflow (CVE-ID: CVE-2024-0565)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer underflow within the receive_encrypted_standard() function in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. A remote attacker can trick the victim to connect to a malicious SMB server, trigger an integer underflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


3) Resource exhaustion (CVE-ID: CVE-2024-26602)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper resource management in kernel/sched/membarrier.c. A local user can trigger resource exhaustion and perform a denial of service (DoS) attack.


4) Trust Boundary Violation (CVE-ID: CVE-2024-1725)

The vulnerability allows a remote user to escalate privileges within the application.

The vulnerability exists due to an error in the kubevirt-csi component of OpenShift Virtualization's Hosted Control Plane (HCP). A remote user can gain access to the root HCP worker node's volume by creating a custom Persistent Volume that matches the name of a worker node.


Remediation

Install update from vendor's website.