SB2025050103 - Multiple vulnerabilities in Red Hat OpenShift Container Platform 4.18



SB2025050103 - Multiple vulnerabilities in Red Hat OpenShift Container Platform 4.18

Published: May 1, 2025

Security Bulletin ID SB2025050103
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 67% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Resource exhaustion (CVE-ID: CVE-2025-30204)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources within the parse.ParseUnverified function when parsing authorization header. A remote attacker can send a specially crafted HTTP response to the application, trigger resource exhaustion and perform a denial of service (DoS) attack.


2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2024-8676)

The vulnerability allows a remote user to escalate privileges on the system.

The vulnerability exists due to the way CRI-O handles restoration of archive container. A remote user with access to the kubelet or cri-o socket can call the restore endpoint and trigger the restore.When restoration starts, the application will attempt to restore the mounts from the restore archive instead of the pod request and access host mounts.


3) Resource exhaustion (CVE-ID: CVE-2025-27144)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources when parsing JWS and JWE input. A remote attacker can pass specially crafted data to the application, trigger resource exhaustion and perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.