Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2023-3955
Vulnerability from cvelistv5
Published
2023-10-31 20:36
Modified
2025-02-13 17:03
Severity ?
EPSS score ?
Summary
A security issue was discovered in Kubernetes where a user
that can create pods on Windows nodes may be able to escalate to admin
privileges on those nodes. Kubernetes clusters are only affected if they
include Windows nodes.
References
▼ | URL | Tags | |
---|---|---|---|
jordan@liggitt.net | https://github.com/kubernetes/kubernetes/issues/119595 | Exploit, Mitigation, Patch, Third Party Advisory | |
jordan@liggitt.net | https://groups.google.com/g/kubernetes-security-announce/c/JrX4bb7d83E | Technical Description | |
jordan@liggitt.net | https://security.netapp.com/advisory/ntap-20231221-0002/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/kubernetes/kubernetes/issues/119595 | Exploit, Mitigation, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/g/kubernetes-security-announce/c/JrX4bb7d83E | Technical Description | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20231221-0002/ |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Kubernetes | kubelet |
Version: v1.28.0 Version: v1.27.0 ≤ v1.27.4 Version: v1.26.0 ≤ v1.26.7 Version: v1.25.0 ≤ v1.25.12 Version: 0 ≤ v1.24.16 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T07:08:50.695Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "issue-tracking", "x_transferred", ], url: "https://github.com/kubernetes/kubernetes/issues/119595", }, { tags: [ "mailing-list", "x_transferred", ], url: "https://groups.google.com/g/kubernetes-security-announce/c/JrX4bb7d83E", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20231221-0002/", }, ], title: "CVE Program Container", }, { affected: [ { cpes: [ "cpe:2.3:a:kubernetes:kubelet:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "kubelet", vendor: "kubernetes", versions: [ { status: "affected", version: "1.28.0", }, { lessThanOrEqual: "1.27.4", status: "affected", version: "1.27.0", versionType: "semver", }, { lessThanOrEqual: "1.26.7", status: "affected", version: "1.26.0", versionType: "semver", }, { lessThanOrEqual: "1.25.12", status: "affected", version: "1.25.0", versionType: "semver", }, { status: "unaffected", version: "1.28.1", }, { status: "unaffected", version: "1.27.5", }, { status: "unaffected", version: "1.26.8", }, { status: "unaffected", version: "1.25.13", }, { status: "unaffected", version: "1.24.17", }, { lessThanOrEqual: "1.24.16", status: "affected", version: "0", versionType: "semver", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2023-3955", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-15T17:15:32.217974Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-15T17:57:40.577Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "kubelet", repo: "https://github.com/kubernetes/kubernetes", vendor: "Kubernetes", versions: [ { status: "affected", version: "v1.28.0", }, { lessThanOrEqual: "v1.27.4", status: "affected", version: "v1.27.0", versionType: "semver", }, { lessThanOrEqual: "v1.26.7", status: "affected", version: "v1.26.0", versionType: "semver", }, { lessThanOrEqual: "v1.25.12", status: "affected", version: "v1.25.0", versionType: "semver", }, { status: "unaffected", version: "v1.28.1", }, { status: "unaffected", version: "v1.27.5", }, { status: "unaffected", version: "v1.26.8", }, { status: "unaffected", version: "v1.25.13", }, { status: "unaffected", version: "v1.24.17", }, { lessThanOrEqual: "v1.24.16", status: "affected", version: "0", versionType: "semver", }, ], }, ], credits: [ { lang: "en", type: "finder", user: "00000000-0000-4000-9000-000000000000", value: "James Sturtevant", }, { lang: "en", type: "finder", user: "00000000-0000-4000-9000-000000000000", value: "Mark Rossetti", }, ], datePublic: "2023-08-23T04:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "A security issue was discovered in Kubernetes where a user\n that can create pods on Windows nodes may be able to escalate to admin \nprivileges on those nodes. Kubernetes clusters are only affected if they\n include Windows nodes.<br>", }, ], value: "A security issue was discovered in Kubernetes where a user\n that can create pods on Windows nodes may be able to escalate to admin \nprivileges on those nodes. Kubernetes clusters are only affected if they\n include Windows nodes.", }, ], impacts: [ { capecId: "CAPEC-233", descriptions: [ { lang: "en", value: "CAPEC-233 Privilege Escalation", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20 Improper Input Validation", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-12-21T22:06:20.809Z", orgId: "a6081bf6-c852-4425-ad4f-a67919267565", shortName: "kubernetes", }, references: [ { tags: [ "issue-tracking", ], url: "https://github.com/kubernetes/kubernetes/issues/119595", }, { tags: [ "mailing-list", ], url: "https://groups.google.com/g/kubernetes-security-announce/c/JrX4bb7d83E", }, { url: "https://security.netapp.com/advisory/ntap-20231221-0002/", }, ], source: { discovery: "INTERNAL", }, title: "Kubernetes - Windows nodes - Insufficient input sanitization leads to privilege escalation", x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "a6081bf6-c852-4425-ad4f-a67919267565", assignerShortName: "kubernetes", cveId: "CVE-2023-3955", datePublished: "2023-10-31T20:36:54.352Z", dateReserved: "2023-07-26T13:51:11.192Z", dateUpdated: "2025-02-13T17:03:13.470Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2023-3955\",\"sourceIdentifier\":\"jordan@liggitt.net\",\"published\":\"2023-10-31T21:15:08.613\",\"lastModified\":\"2025-02-13T17:17:00.000\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A security issue was discovered in Kubernetes where a user\\n that can create pods on Windows nodes may be able to escalate to admin \\nprivileges on those nodes. Kubernetes clusters are only affected if they\\n include Windows nodes.\"},{\"lang\":\"es\",\"value\":\"Se descubrió un problema de seguridad en Kubernetes donde un usuario que puede crear pods en nodos de Windows puede escalar a privilegios de administrador en esos nodos. Los clústeres de Kubernetes solo se ven afectados si incluyen nodos de Windows.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"jordan@liggitt.net\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"jordan@liggitt.net\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.24.17\",\"matchCriteriaId\":\"FF4C81ED-BB69-490B-BABA-89C2501A5E6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.25.0\",\"versionEndExcluding\":\"1.25.13\",\"matchCriteriaId\":\"86AE4580-37A1-4E7B-9B7A-A30316676065\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.26.0\",\"versionEndExcluding\":\"1.26.8\",\"matchCriteriaId\":\"99BCE3D9-3EFA-4358-B36E-47954DBE28D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.27.0\",\"versionEndExcluding\":\"1.27.5\",\"matchCriteriaId\":\"3F30AD24-3FA9-4FA8-BCD5-5351EA357B49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.28.0\",\"versionEndExcluding\":\"1.28.1\",\"matchCriteriaId\":\"A3FAE518-D5F9-4A7D-A703-1D36EA8A563C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}],\"references\":[{\"url\":\"https://github.com/kubernetes/kubernetes/issues/119595\",\"source\":\"jordan@liggitt.net\",\"tags\":[\"Exploit\",\"Mitigation\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://groups.google.com/g/kubernetes-security-announce/c/JrX4bb7d83E\",\"source\":\"jordan@liggitt.net\",\"tags\":[\"Technical Description\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20231221-0002/\",\"source\":\"jordan@liggitt.net\"},{\"url\":\"https://github.com/kubernetes/kubernetes/issues/119595\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mitigation\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://groups.google.com/g/kubernetes-security-announce/c/JrX4bb7d83E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Technical Description\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20231221-0002/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", vulnrichment: { containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/kubernetes/kubernetes/issues/119595\", \"tags\": [\"issue-tracking\", \"x_transferred\"]}, {\"url\": \"https://groups.google.com/g/kubernetes-security-announce/c/JrX4bb7d83E\", \"tags\": [\"mailing-list\", \"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20231221-0002/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T07:08:50.695Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-3955\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-15T17:15:32.217974Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:kubernetes:kubelet:*:*:*:*:*:*:*:*\"], \"vendor\": \"kubernetes\", \"product\": \"kubelet\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.28.0\"}, {\"status\": \"affected\", \"version\": \"1.27.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"1.27.4\"}, {\"status\": \"affected\", \"version\": \"1.26.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"1.26.7\"}, {\"status\": \"affected\", \"version\": \"1.25.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"1.25.12\"}, {\"status\": \"unaffected\", \"version\": \"1.28.1\"}, {\"status\": \"unaffected\", \"version\": \"1.27.5\"}, {\"status\": \"unaffected\", \"version\": \"1.26.8\"}, {\"status\": \"unaffected\", \"version\": \"1.25.13\"}, {\"status\": \"unaffected\", \"version\": \"1.24.17\"}, {\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"1.24.16\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-15T17:57:07.697Z\"}}], \"cna\": {\"title\": \"Kubernetes - Windows nodes - Insufficient input sanitization leads to privilege escalation\", \"source\": {\"discovery\": \"INTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"user\": \"00000000-0000-4000-9000-000000000000\", \"value\": \"James Sturtevant\"}, {\"lang\": \"en\", \"type\": \"finder\", \"user\": \"00000000-0000-4000-9000-000000000000\", \"value\": \"Mark Rossetti\"}], \"impacts\": [{\"capecId\": \"CAPEC-233\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-233 Privilege Escalation\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"repo\": \"https://github.com/kubernetes/kubernetes\", \"vendor\": \"Kubernetes\", \"product\": \"kubelet\", \"versions\": [{\"status\": \"affected\", \"version\": \"v1.28.0\"}, {\"status\": \"affected\", \"version\": \"v1.27.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"v1.27.4\"}, {\"status\": \"affected\", \"version\": \"v1.26.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"v1.26.7\"}, {\"status\": \"affected\", \"version\": \"v1.25.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"v1.25.12\"}, {\"status\": \"unaffected\", \"version\": \"v1.28.1\"}, {\"status\": \"unaffected\", \"version\": \"v1.27.5\"}, {\"status\": \"unaffected\", \"version\": \"v1.26.8\"}, {\"status\": \"unaffected\", \"version\": \"v1.25.13\"}, {\"status\": \"unaffected\", \"version\": \"v1.24.17\"}, {\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"v1.24.16\"}], \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2023-08-23T04:00:00.000Z\", \"references\": [{\"url\": \"https://github.com/kubernetes/kubernetes/issues/119595\", \"tags\": [\"issue-tracking\"]}, {\"url\": \"https://groups.google.com/g/kubernetes-security-announce/c/JrX4bb7d83E\", \"tags\": [\"mailing-list\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20231221-0002/\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A security issue was discovered in Kubernetes where a user\\n that can create pods on Windows nodes may be able to escalate to admin \\nprivileges on those nodes. Kubernetes clusters are only affected if they\\n include Windows nodes.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"A security issue was discovered in Kubernetes where a user\\n that can create pods on Windows nodes may be able to escalate to admin \\nprivileges on those nodes. Kubernetes clusters are only affected if they\\n include Windows nodes.<br>\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"CWE-20 Improper Input Validation\"}]}], \"providerMetadata\": {\"orgId\": \"a6081bf6-c852-4425-ad4f-a67919267565\", \"shortName\": \"kubernetes\", \"dateUpdated\": \"2023-12-21T22:06:20.809Z\"}}}", cveMetadata: "{\"cveId\": \"CVE-2023-3955\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-13T17:03:13.470Z\", \"dateReserved\": \"2023-07-26T13:51:11.192Z\", \"assignerOrgId\": \"a6081bf6-c852-4425-ad4f-a67919267565\", \"datePublished\": \"2023-10-31T20:36:54.352Z\", \"assignerShortName\": \"kubernetes\"}", dataType: "CVE_RECORD", dataVersion: "5.1", }, }, }
RHSA-2023:4777
Vulnerability from csaf_redhat
Published
2023-08-28 15:26
Modified
2024-11-22 22:16
Summary
Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 7.1.1 security update
Notes
Topic
The components for Red Hat OpenShift support for Windows Containers 7.1.1 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift support for Windows Containers allows you to deploy Windows container workloads running on Windows Server containers.
Security Fix(es):
* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3676)
* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3955)
For more details about the security issue(s), including the impact, CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "The components for Red Hat OpenShift support for Windows Containers 7.1.1 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Red Hat OpenShift support for Windows Containers allows you to deploy Windows container workloads running on Windows Server containers.\n\nSecurity Fix(es):\n\n* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3676)\n\n* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3955)\n\nFor more details about the security issue(s), including the impact, CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2023:4777", url: "https://access.redhat.com/errata/RHSA-2023:4777", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "2227126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227126", }, { category: "external", summary: "2227128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227128", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_4777.json", }, ], title: "Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 7.1.1 security update", tracking: { current_release_date: "2024-11-22T22:16:11+00:00", generator: { date: "2024-11-22T22:16:11+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2023:4777", initial_release_date: "2023-08-28T15:26:43+00:00", revision_history: [ { date: "2023-08-28T15:26:43+00:00", number: "1", summary: "Initial version", }, { date: "2023-08-28T15:26:43+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T22:16:11+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat OpenShift Container Platform 4.12", product: { name: "Red Hat OpenShift Container Platform 4.12", product_id: "8Base-RHOSE-4.12", product_identification_helper: { cpe: "cpe:/a:redhat:openshift:4.12::el8", }, }, }, ], category: "product_family", name: "Red Hat OpenShift Enterprise", }, { branches: [ { category: "product_version", name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f_amd64", product: { name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f_amd64", product_id: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f?arch=amd64&repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-operator-bundle&tag=v7.1.1-8", }, }, }, { category: "product_version", name: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", product: { name: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", product_id: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db?arch=amd64&repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-rhel8-operator&tag=7.1.1-9", }, }, }, ], category: "architecture", name: "amd64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f_amd64 as a component of Red Hat OpenShift Container Platform 4.12", product_id: "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f_amd64", }, product_reference: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f_amd64", relates_to_product_reference: "8Base-RHOSE-4.12", }, { category: "default_component_of", full_product_name: { name: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64 as a component of Red Hat OpenShift Container Platform 4.12", product_id: "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", }, product_reference: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", relates_to_product_reference: "8Base-RHOSE-4.12", }, ], }, vulnerabilities: [ { cve: "CVE-2023-3676", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, discovery_date: "2023-07-28T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f_amd64", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2227126", }, ], notes: [ { category: "description", text: "A vulnerability was found in Kubernetes. This flaw allows a user who can create pods on Windows nodes to escalate to admin privileges on those nodes.", title: "Vulnerability description", }, { category: "summary", text: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", title: "Vulnerability summary", }, { category: "other", text: "Kubernetes clusters are only affected if they include Windows nodes. Any Kubernetes environment with Windows nodes is impacted. Run kubectl get nodes -l kubernetes.io/os=windows to see if any Windows nodes are in use.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", ], known_not_affected: [ "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-3676", }, { category: "external", summary: "RHBZ#2227126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227126", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-3676", url: "https://www.cve.org/CVERecord?id=CVE-2023-3676", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-3676", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3676", }, ], release_date: "2023-08-23T13:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-08-28T15:26:43+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:4777", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", }, { cve: "CVE-2023-3955", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, discovery_date: "2023-07-28T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f_amd64", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2227128", }, ], notes: [ { category: "description", text: "A vulnerability was found in Kubernetes. This flaw allows a user who can create pods on Windows nodes to escalate to admin privileges on those nodes.", title: "Vulnerability description", }, { category: "summary", text: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", title: "Vulnerability summary", }, { category: "other", text: "Kubernetes clusters are only affected if they include Windows nodes. Any Kubernetes environment with Windows nodes is impacted. Run kubectl get nodes -l kubernetes.io/os=windows to see if any Windows nodes are in use.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", ], known_not_affected: [ "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-3955", }, { category: "external", summary: "RHBZ#2227128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227128", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-3955", url: "https://www.cve.org/CVERecord?id=CVE-2023-3955", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-3955", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3955", }, ], release_date: "2023-08-23T13:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-08-28T15:26:43+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:4777", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", }, ], }
rhsa-2023_4835
Vulnerability from csaf_redhat
Published
2023-08-29 09:24
Modified
2024-11-22 22:16
Summary
Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 5.1.2 security update
Notes
Topic
The components for Red Hat OpenShift support for Windows Containers 5.1.2 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift support for Windows Containers allows you to deploy Windows container workloads running on Windows Server containers.
Security Fix(es):
* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3676)
* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3955)
For more details about the security issue(s), including the impact, CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "The components for Red Hat OpenShift support for Windows Containers 5.1.2 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Red Hat OpenShift support for Windows Containers allows you to deploy Windows container workloads running on Windows Server containers.\n\nSecurity Fix(es):\n\n* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3676)\n\n* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3955)\n\nFor more details about the security issue(s), including the impact, CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2023:4835", url: "https://access.redhat.com/errata/RHSA-2023:4835", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "2227126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227126", }, { category: "external", summary: "2227128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227128", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_4835.json", }, ], title: "Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 5.1.2 security update", tracking: { current_release_date: "2024-11-22T22:16:28+00:00", generator: { date: "2024-11-22T22:16:28+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2023:4835", initial_release_date: "2023-08-29T09:24:51+00:00", revision_history: [ { date: "2023-08-29T09:24:51+00:00", number: "1", summary: "Initial version", }, { date: "2023-08-29T09:24:51+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T22:16:28+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat OpenShift Container Platform 4.10", product: { name: "Red Hat OpenShift Container Platform 4.10", product_id: "8Base-RHOSE-4.10", product_identification_helper: { cpe: "cpe:/a:redhat:openshift:4.10::el8", }, }, }, ], category: "product_family", name: "Red Hat OpenShift Enterprise", }, { branches: [ { category: "product_version", name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba_amd64", product: { name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba_amd64", product_id: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba?arch=amd64&repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-operator-bundle&tag=v5.1.2-2", }, }, }, { category: "product_version", name: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", product: { name: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", product_id: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e?arch=amd64&repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-rhel8-operator&tag=5.1.2-3", }, }, }, ], category: "architecture", name: "amd64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba_amd64 as a component of Red Hat OpenShift Container Platform 4.10", product_id: "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba_amd64", }, product_reference: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba_amd64", relates_to_product_reference: "8Base-RHOSE-4.10", }, { category: "default_component_of", full_product_name: { name: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64 as a component of Red Hat OpenShift Container Platform 4.10", product_id: "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", }, product_reference: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", relates_to_product_reference: "8Base-RHOSE-4.10", }, ], }, vulnerabilities: [ { cve: "CVE-2023-3676", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, discovery_date: "2023-07-28T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba_amd64", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2227126", }, ], notes: [ { category: "description", text: "A vulnerability was found in Kubernetes. This flaw allows a user who can create pods on Windows nodes to escalate to admin privileges on those nodes.", title: "Vulnerability description", }, { category: "summary", text: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", title: "Vulnerability summary", }, { category: "other", text: "Kubernetes clusters are only affected if they include Windows nodes. Any Kubernetes environment with Windows nodes is impacted. Run kubectl get nodes -l kubernetes.io/os=windows to see if any Windows nodes are in use.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", ], known_not_affected: [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-3676", }, { category: "external", summary: "RHBZ#2227126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227126", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-3676", url: "https://www.cve.org/CVERecord?id=CVE-2023-3676", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-3676", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3676", }, ], release_date: "2023-08-23T13:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-08-29T09:24:51+00:00", details: "For Windows Machine Config Operator upgrades, see the following documentation: \nhttps://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", product_ids: [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:4835", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", }, { cve: "CVE-2023-3955", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, discovery_date: "2023-07-28T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba_amd64", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2227128", }, ], notes: [ { category: "description", text: "A vulnerability was found in Kubernetes. This flaw allows a user who can create pods on Windows nodes to escalate to admin privileges on those nodes.", title: "Vulnerability description", }, { category: "summary", text: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", title: "Vulnerability summary", }, { category: "other", text: "Kubernetes clusters are only affected if they include Windows nodes. Any Kubernetes environment with Windows nodes is impacted. Run kubectl get nodes -l kubernetes.io/os=windows to see if any Windows nodes are in use.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", ], known_not_affected: [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-3955", }, { category: "external", summary: "RHBZ#2227128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227128", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-3955", url: "https://www.cve.org/CVERecord?id=CVE-2023-3955", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-3955", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3955", }, ], release_date: "2023-08-23T13:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-08-29T09:24:51+00:00", details: "For Windows Machine Config Operator upgrades, see the following documentation: \nhttps://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", product_ids: [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:4835", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", }, ], }
rhsa-2023_4777
Vulnerability from csaf_redhat
Published
2023-08-28 15:26
Modified
2024-11-22 22:16
Summary
Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 7.1.1 security update
Notes
Topic
The components for Red Hat OpenShift support for Windows Containers 7.1.1 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift support for Windows Containers allows you to deploy Windows container workloads running on Windows Server containers.
Security Fix(es):
* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3676)
* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3955)
For more details about the security issue(s), including the impact, CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "The components for Red Hat OpenShift support for Windows Containers 7.1.1 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Red Hat OpenShift support for Windows Containers allows you to deploy Windows container workloads running on Windows Server containers.\n\nSecurity Fix(es):\n\n* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3676)\n\n* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3955)\n\nFor more details about the security issue(s), including the impact, CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2023:4777", url: "https://access.redhat.com/errata/RHSA-2023:4777", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "2227126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227126", }, { category: "external", summary: "2227128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227128", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_4777.json", }, ], title: "Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 7.1.1 security update", tracking: { current_release_date: "2024-11-22T22:16:11+00:00", generator: { date: "2024-11-22T22:16:11+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2023:4777", initial_release_date: "2023-08-28T15:26:43+00:00", revision_history: [ { date: "2023-08-28T15:26:43+00:00", number: "1", summary: "Initial version", }, { date: "2023-08-28T15:26:43+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T22:16:11+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat OpenShift Container Platform 4.12", product: { name: "Red Hat OpenShift Container Platform 4.12", product_id: "8Base-RHOSE-4.12", product_identification_helper: { cpe: "cpe:/a:redhat:openshift:4.12::el8", }, }, }, ], category: "product_family", name: "Red Hat OpenShift Enterprise", }, { branches: [ { category: "product_version", name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f_amd64", product: { name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f_amd64", product_id: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f?arch=amd64&repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-operator-bundle&tag=v7.1.1-8", }, }, }, { category: "product_version", name: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", product: { name: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", product_id: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db?arch=amd64&repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-rhel8-operator&tag=7.1.1-9", }, }, }, ], category: "architecture", name: "amd64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f_amd64 as a component of Red Hat OpenShift Container Platform 4.12", product_id: "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f_amd64", }, product_reference: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f_amd64", relates_to_product_reference: "8Base-RHOSE-4.12", }, { category: "default_component_of", full_product_name: { name: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64 as a component of Red Hat OpenShift Container Platform 4.12", product_id: "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", }, product_reference: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", relates_to_product_reference: "8Base-RHOSE-4.12", }, ], }, vulnerabilities: [ { cve: "CVE-2023-3676", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, discovery_date: "2023-07-28T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f_amd64", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2227126", }, ], notes: [ { category: "description", text: "A vulnerability was found in Kubernetes. This flaw allows a user who can create pods on Windows nodes to escalate to admin privileges on those nodes.", title: "Vulnerability description", }, { category: "summary", text: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", title: "Vulnerability summary", }, { category: "other", text: "Kubernetes clusters are only affected if they include Windows nodes. Any Kubernetes environment with Windows nodes is impacted. Run kubectl get nodes -l kubernetes.io/os=windows to see if any Windows nodes are in use.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", ], known_not_affected: [ "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-3676", }, { category: "external", summary: "RHBZ#2227126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227126", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-3676", url: "https://www.cve.org/CVERecord?id=CVE-2023-3676", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-3676", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3676", }, ], release_date: "2023-08-23T13:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-08-28T15:26:43+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:4777", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", }, { cve: "CVE-2023-3955", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, discovery_date: "2023-07-28T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f_amd64", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2227128", }, ], notes: [ { category: "description", text: "A vulnerability was found in Kubernetes. This flaw allows a user who can create pods on Windows nodes to escalate to admin privileges on those nodes.", title: "Vulnerability description", }, { category: "summary", text: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", title: "Vulnerability summary", }, { category: "other", text: "Kubernetes clusters are only affected if they include Windows nodes. Any Kubernetes environment with Windows nodes is impacted. Run kubectl get nodes -l kubernetes.io/os=windows to see if any Windows nodes are in use.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", ], known_not_affected: [ "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-3955", }, { category: "external", summary: "RHBZ#2227128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227128", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-3955", url: "https://www.cve.org/CVERecord?id=CVE-2023-3955", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-3955", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3955", }, ], release_date: "2023-08-23T13:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-08-28T15:26:43+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:4777", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", }, ], }
rhsa-2023:4777
Vulnerability from csaf_redhat
Published
2023-08-28 15:26
Modified
2024-11-22 22:16
Summary
Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 7.1.1 security update
Notes
Topic
The components for Red Hat OpenShift support for Windows Containers 7.1.1 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift support for Windows Containers allows you to deploy Windows container workloads running on Windows Server containers.
Security Fix(es):
* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3676)
* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3955)
For more details about the security issue(s), including the impact, CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "The components for Red Hat OpenShift support for Windows Containers 7.1.1 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Red Hat OpenShift support for Windows Containers allows you to deploy Windows container workloads running on Windows Server containers.\n\nSecurity Fix(es):\n\n* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3676)\n\n* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3955)\n\nFor more details about the security issue(s), including the impact, CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2023:4777", url: "https://access.redhat.com/errata/RHSA-2023:4777", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "2227126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227126", }, { category: "external", summary: "2227128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227128", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_4777.json", }, ], title: "Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 7.1.1 security update", tracking: { current_release_date: "2024-11-22T22:16:11+00:00", generator: { date: "2024-11-22T22:16:11+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2023:4777", initial_release_date: "2023-08-28T15:26:43+00:00", revision_history: [ { date: "2023-08-28T15:26:43+00:00", number: "1", summary: "Initial version", }, { date: "2023-08-28T15:26:43+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T22:16:11+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat OpenShift Container Platform 4.12", product: { name: "Red Hat OpenShift Container Platform 4.12", product_id: "8Base-RHOSE-4.12", product_identification_helper: { cpe: "cpe:/a:redhat:openshift:4.12::el8", }, }, }, ], category: "product_family", name: "Red Hat OpenShift Enterprise", }, { branches: [ { category: "product_version", name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f_amd64", product: { name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f_amd64", product_id: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f?arch=amd64&repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-operator-bundle&tag=v7.1.1-8", }, }, }, { category: "product_version", name: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", product: { name: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", product_id: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db?arch=amd64&repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-rhel8-operator&tag=7.1.1-9", }, }, }, ], category: "architecture", name: "amd64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f_amd64 as a component of Red Hat OpenShift Container Platform 4.12", product_id: "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f_amd64", }, product_reference: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f_amd64", relates_to_product_reference: "8Base-RHOSE-4.12", }, { category: "default_component_of", full_product_name: { name: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64 as a component of Red Hat OpenShift Container Platform 4.12", product_id: "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", }, product_reference: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", relates_to_product_reference: "8Base-RHOSE-4.12", }, ], }, vulnerabilities: [ { cve: "CVE-2023-3676", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, discovery_date: "2023-07-28T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f_amd64", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2227126", }, ], notes: [ { category: "description", text: "A vulnerability was found in Kubernetes. This flaw allows a user who can create pods on Windows nodes to escalate to admin privileges on those nodes.", title: "Vulnerability description", }, { category: "summary", text: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", title: "Vulnerability summary", }, { category: "other", text: "Kubernetes clusters are only affected if they include Windows nodes. Any Kubernetes environment with Windows nodes is impacted. Run kubectl get nodes -l kubernetes.io/os=windows to see if any Windows nodes are in use.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", ], known_not_affected: [ "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-3676", }, { category: "external", summary: "RHBZ#2227126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227126", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-3676", url: "https://www.cve.org/CVERecord?id=CVE-2023-3676", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-3676", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3676", }, ], release_date: "2023-08-23T13:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-08-28T15:26:43+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:4777", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", }, { cve: "CVE-2023-3955", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, discovery_date: "2023-07-28T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f_amd64", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2227128", }, ], notes: [ { category: "description", text: "A vulnerability was found in Kubernetes. This flaw allows a user who can create pods on Windows nodes to escalate to admin privileges on those nodes.", title: "Vulnerability description", }, { category: "summary", text: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", title: "Vulnerability summary", }, { category: "other", text: "Kubernetes clusters are only affected if they include Windows nodes. Any Kubernetes environment with Windows nodes is impacted. Run kubectl get nodes -l kubernetes.io/os=windows to see if any Windows nodes are in use.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", ], known_not_affected: [ "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-operator-bundle@sha256:4c7a13c2c4e3bd3bf1827cd2182ac5c20587e4f214c62c7ff08cc3067433229f_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-3955", }, { category: "external", summary: "RHBZ#2227128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227128", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-3955", url: "https://www.cve.org/CVERecord?id=CVE-2023-3955", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-3955", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3955", }, ], release_date: "2023-08-23T13:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-08-28T15:26:43+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:4777", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "8Base-RHOSE-4.12:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:e3938425061488710618f093d94715a8ec9787135fb988a25d313a1642b4d1db_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", }, ], }
RHSA-2023:4780
Vulnerability from csaf_redhat
Published
2023-08-28 17:53
Modified
2024-11-22 22:16
Summary
Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 6.0.2 security update
Notes
Topic
The components for Red Hat OpenShift support for Windows Containers 6.0.2 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift support for Windows Containers allows you to deploy Windows container workloads running on Windows Server containers.
Security Fix(es):
* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3676)
* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3955)
For more details about the security issue(s), including the impact, CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "The components for Red Hat OpenShift support for Windows Containers 6.0.2 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Red Hat OpenShift support for Windows Containers allows you to deploy Windows container workloads running on Windows Server containers.\n\nSecurity Fix(es):\n\n* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3676)\n\n* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3955)\n\nFor more details about the security issue(s), including the impact, CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2023:4780", url: "https://access.redhat.com/errata/RHSA-2023:4780", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "2227126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227126", }, { category: "external", summary: "2227128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227128", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_4780.json", }, ], title: "Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 6.0.2 security update", tracking: { current_release_date: "2024-11-22T22:16:19+00:00", generator: { date: "2024-11-22T22:16:19+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2023:4780", initial_release_date: "2023-08-28T17:53:25+00:00", revision_history: [ { date: "2023-08-28T17:53:25+00:00", number: "1", summary: "Initial version", }, { date: "2023-08-28T17:53:25+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T22:16:19+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat OpenShift Container Platform 4.11", product: { name: "Red Hat OpenShift Container Platform 4.11", product_id: "8Base-RHOSE-4.11", product_identification_helper: { cpe: "cpe:/a:redhat:openshift:4.11::el8", }, }, }, ], category: "product_family", name: "Red Hat OpenShift Enterprise", }, { branches: [ { category: "product_version", name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d_amd64", product: { name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d_amd64", product_id: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d?arch=amd64&repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-operator-bundle&tag=v6.0.2-5", }, }, }, { category: "product_version", name: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", product: { name: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", product_id: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e?arch=amd64&repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-rhel8-operator&tag=6.0.2-5", }, }, }, ], category: "architecture", name: "amd64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d_amd64 as a component of Red Hat OpenShift Container Platform 4.11", product_id: "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d_amd64", }, product_reference: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d_amd64", relates_to_product_reference: "8Base-RHOSE-4.11", }, { category: "default_component_of", full_product_name: { name: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64 as a component of Red Hat OpenShift Container Platform 4.11", product_id: "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", }, product_reference: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", relates_to_product_reference: "8Base-RHOSE-4.11", }, ], }, vulnerabilities: [ { cve: "CVE-2023-3676", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, discovery_date: "2023-07-28T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d_amd64", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2227126", }, ], notes: [ { category: "description", text: "A vulnerability was found in Kubernetes. This flaw allows a user who can create pods on Windows nodes to escalate to admin privileges on those nodes.", title: "Vulnerability description", }, { category: "summary", text: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", title: "Vulnerability summary", }, { category: "other", text: "Kubernetes clusters are only affected if they include Windows nodes. Any Kubernetes environment with Windows nodes is impacted. Run kubectl get nodes -l kubernetes.io/os=windows to see if any Windows nodes are in use.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", ], known_not_affected: [ "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-3676", }, { category: "external", summary: "RHBZ#2227126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227126", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-3676", url: "https://www.cve.org/CVERecord?id=CVE-2023-3676", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-3676", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3676", }, ], release_date: "2023-08-23T13:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-08-28T17:53:25+00:00", details: "For Windows Machine Config Operator upgrades, see the following documentation:\nhttps://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", product_ids: [ "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:4780", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", }, { cve: "CVE-2023-3955", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, discovery_date: "2023-07-28T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d_amd64", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2227128", }, ], notes: [ { category: "description", text: "A vulnerability was found in Kubernetes. This flaw allows a user who can create pods on Windows nodes to escalate to admin privileges on those nodes.", title: "Vulnerability description", }, { category: "summary", text: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", title: "Vulnerability summary", }, { category: "other", text: "Kubernetes clusters are only affected if they include Windows nodes. Any Kubernetes environment with Windows nodes is impacted. Run kubectl get nodes -l kubernetes.io/os=windows to see if any Windows nodes are in use.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", ], known_not_affected: [ "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-3955", }, { category: "external", summary: "RHBZ#2227128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227128", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-3955", url: "https://www.cve.org/CVERecord?id=CVE-2023-3955", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-3955", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3955", }, ], release_date: "2023-08-23T13:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-08-28T17:53:25+00:00", details: "For Windows Machine Config Operator upgrades, see the following documentation:\nhttps://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", product_ids: [ "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:4780", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", }, ], }
rhsa-2023_7515
Vulnerability from csaf_redhat
Published
2023-11-27 16:08
Modified
2025-01-06 21:53
Summary
Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 9.0.0 security update
Notes
Topic
The components for Red Hat OpenShift for Windows Containers 9.0.0 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift for Windows Containers allows you to deploy Windows container workloads running on Windows Server nodes.
Security Fix(es):
* golang: net/http, x/net/http2: rapid stream resets can cause excessive work (Rapid Reset Attack) (CVE-2023-39325)
A Red Hat Security Bulletin which addresses further details about the Rapid Reset flaw is available in the References section.
* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3676) (CVE-2023-3955)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "The components for Red Hat OpenShift for Windows Containers 9.0.0 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Red Hat OpenShift for Windows Containers allows you to deploy Windows container workloads running on Windows Server nodes.\n\nSecurity Fix(es):\n\n* golang: net/http, x/net/http2: rapid stream resets can cause excessive work (Rapid Reset Attack) (CVE-2023-39325)\n\nA Red Hat Security Bulletin which addresses further details about the Rapid Reset flaw is available in the References section.\n\n* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3676) (CVE-2023-3955)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2023:7515", url: "https://access.redhat.com/errata/RHSA-2023:7515", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003", url: "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003", }, { category: "external", summary: "2227126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227126", }, { category: "external", summary: "2227128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227128", }, { category: "external", summary: "2243296", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243296", }, { category: "external", summary: "OCPBUGS-10222", url: "https://issues.redhat.com/browse/OCPBUGS-10222", }, { category: "external", summary: "OCPBUGS-10437", url: "https://issues.redhat.com/browse/OCPBUGS-10437", }, { category: "external", summary: "OCPBUGS-10572", url: "https://issues.redhat.com/browse/OCPBUGS-10572", }, { category: "external", summary: "OCPBUGS-11259", url: "https://issues.redhat.com/browse/OCPBUGS-11259", }, { category: "external", summary: "OCPBUGS-11306", url: "https://issues.redhat.com/browse/OCPBUGS-11306", }, { category: "external", summary: "OCPBUGS-12971", url: "https://issues.redhat.com/browse/OCPBUGS-12971", }, { category: "external", summary: "OCPBUGS-13244", url: "https://issues.redhat.com/browse/OCPBUGS-13244", }, { category: "external", summary: "OCPBUGS-13780", url: "https://issues.redhat.com/browse/OCPBUGS-13780", }, { category: "external", summary: "OCPBUGS-14700", url: "https://issues.redhat.com/browse/OCPBUGS-14700", }, { category: "external", summary: "OCPBUGS-15461", url: "https://issues.redhat.com/browse/OCPBUGS-15461", }, { category: "external", summary: "OCPBUGS-17528", url: "https://issues.redhat.com/browse/OCPBUGS-17528", }, { category: "external", summary: "OCPBUGS-19040", url: "https://issues.redhat.com/browse/OCPBUGS-19040", }, { category: "external", summary: "OCPBUGS-19949", url: "https://issues.redhat.com/browse/OCPBUGS-19949", }, { category: "external", summary: "OCPBUGS-20054", url: "https://issues.redhat.com/browse/OCPBUGS-20054", }, { category: "external", summary: "OCPBUGS-20067", url: "https://issues.redhat.com/browse/OCPBUGS-20067", }, { category: "external", summary: "OCPBUGS-20191", url: "https://issues.redhat.com/browse/OCPBUGS-20191", }, { category: "external", summary: "OCPBUGS-20664", url: "https://issues.redhat.com/browse/OCPBUGS-20664", }, { category: "external", summary: "OCPBUGS-22328", url: "https://issues.redhat.com/browse/OCPBUGS-22328", }, { category: "external", summary: "OCPBUGS-22711", url: "https://issues.redhat.com/browse/OCPBUGS-22711", }, { category: "external", summary: "WINC-1001", url: "https://issues.redhat.com/browse/WINC-1001", }, { category: "external", summary: "WINC-1003", url: "https://issues.redhat.com/browse/WINC-1003", }, { category: "external", summary: "WINC-1004", url: "https://issues.redhat.com/browse/WINC-1004", }, { category: "external", summary: "WINC-1010", url: "https://issues.redhat.com/browse/WINC-1010", }, { category: "external", summary: "WINC-1023", url: "https://issues.redhat.com/browse/WINC-1023", }, { category: "external", summary: "WINC-1025", url: "https://issues.redhat.com/browse/WINC-1025", }, { category: "external", summary: "WINC-1033", url: "https://issues.redhat.com/browse/WINC-1033", }, { category: "external", summary: "WINC-1035", url: "https://issues.redhat.com/browse/WINC-1035", }, { category: "external", summary: "WINC-1037", url: "https://issues.redhat.com/browse/WINC-1037", }, { category: "external", summary: "WINC-1040", url: "https://issues.redhat.com/browse/WINC-1040", }, { category: "external", summary: "WINC-1043", url: "https://issues.redhat.com/browse/WINC-1043", }, { category: "external", summary: "WINC-1090", url: "https://issues.redhat.com/browse/WINC-1090", }, { category: "external", summary: "WINC-1092", url: "https://issues.redhat.com/browse/WINC-1092", }, { category: "external", summary: "WINC-1098", url: "https://issues.redhat.com/browse/WINC-1098", }, { category: "external", summary: "WINC-561", url: "https://issues.redhat.com/browse/WINC-561", }, { category: "external", summary: "WINC-633", url: "https://issues.redhat.com/browse/WINC-633", }, { category: "external", summary: "WINC-635", url: "https://issues.redhat.com/browse/WINC-635", }, { category: "external", summary: "WINC-637", url: "https://issues.redhat.com/browse/WINC-637", }, { category: "external", summary: "WINC-688", url: "https://issues.redhat.com/browse/WINC-688", }, { category: "external", summary: "WINC-805", url: "https://issues.redhat.com/browse/WINC-805", }, { category: "external", summary: "WINC-860", url: "https://issues.redhat.com/browse/WINC-860", }, { category: "external", summary: "WINC-861", url: "https://issues.redhat.com/browse/WINC-861", }, { category: "external", summary: "WINC-863", url: "https://issues.redhat.com/browse/WINC-863", }, { category: "external", summary: "WINC-945", url: "https://issues.redhat.com/browse/WINC-945", }, { category: "external", summary: "WINC-948", url: "https://issues.redhat.com/browse/WINC-948", }, { category: "external", summary: "WINC-950", url: "https://issues.redhat.com/browse/WINC-950", }, { category: "external", summary: "WINC-952", url: "https://issues.redhat.com/browse/WINC-952", }, { category: "external", summary: "WINC-959", url: "https://issues.redhat.com/browse/WINC-959", }, { category: "external", summary: "WINC-998", url: "https://issues.redhat.com/browse/WINC-998", }, { category: "external", summary: "WINC-999", url: "https://issues.redhat.com/browse/WINC-999", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_7515.json", }, ], title: "Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 9.0.0 security update", tracking: { current_release_date: "2025-01-06T21:53:39+00:00", generator: { date: "2025-01-06T21:53:39+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.5", }, }, id: "RHSA-2023:7515", initial_release_date: "2023-11-27T16:08:33+00:00", revision_history: [ { date: "2023-11-27T16:08:33+00:00", number: "1", summary: "Initial version", }, { date: "2023-11-27T16:08:33+00:00", number: "2", summary: "Last updated version", }, { date: "2025-01-06T21:53:39+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat OpenShift Container Platform 4.14", product: { name: "Red Hat OpenShift Container Platform 4.14", product_id: "9Base-RHOSE-4.14", product_identification_helper: { cpe: "cpe:/a:redhat:openshift:4.14::el9", }, }, }, ], category: "product_family", name: "Red Hat OpenShift Enterprise", }, { branches: [ { category: "product_version", name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", product: { name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", product_id: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f?arch=amd64&repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-operator-bundle&tag=v9.0.0-104", }, }, }, { category: "product_version", name: "openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", product: { name: "openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", product_id: "openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f?arch=amd64&repository_url=registry.redhat.io/openshift4/windows-machine-config-operator-bundle&tag=v9.0.0-104", }, }, }, { category: "product_version", name: "openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", product: { name: "openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", product_id: "openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c?arch=amd64&repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-rhel9-operator&tag=9.0.0-105", }, }, }, ], category: "architecture", name: "amd64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64 as a component of Red Hat OpenShift Container Platform 4.14", product_id: "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", }, product_reference: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", relates_to_product_reference: "9Base-RHOSE-4.14", }, { category: "default_component_of", full_product_name: { name: "openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64 as a component of Red Hat OpenShift Container Platform 4.14", product_id: "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", }, product_reference: "openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", relates_to_product_reference: "9Base-RHOSE-4.14", }, { category: "default_component_of", full_product_name: { name: "openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64 as a component of Red Hat OpenShift Container Platform 4.14", product_id: "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", }, product_reference: "openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", relates_to_product_reference: "9Base-RHOSE-4.14", }, ], }, vulnerabilities: [ { cve: "CVE-2023-3676", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, discovery_date: "2023-07-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2227126", }, ], notes: [ { category: "description", text: "A vulnerability was found in Kubernetes. This flaw allows a user who can create pods on Windows nodes to escalate to admin privileges on those nodes.", title: "Vulnerability description", }, { category: "summary", text: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", title: "Vulnerability summary", }, { category: "other", text: "Kubernetes clusters are only affected if they include Windows nodes. Any Kubernetes environment with Windows nodes is impacted. Run kubectl get nodes -l kubernetes.io/os=windows to see if any Windows nodes are in use.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-3676", }, { category: "external", summary: "RHBZ#2227126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227126", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-3676", url: "https://www.cve.org/CVERecord?id=CVE-2023-3676", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-3676", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3676", }, ], release_date: "2023-08-23T13:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-27T16:08:33+00:00", details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:7515", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", }, { cve: "CVE-2023-3955", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, discovery_date: "2023-07-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2227128", }, ], notes: [ { category: "description", text: "A vulnerability was found in Kubernetes. This flaw allows a user who can create pods on Windows nodes to escalate to admin privileges on those nodes.", title: "Vulnerability description", }, { category: "summary", text: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", title: "Vulnerability summary", }, { category: "other", text: "Kubernetes clusters are only affected if they include Windows nodes. Any Kubernetes environment with Windows nodes is impacted. Run kubectl get nodes -l kubernetes.io/os=windows to see if any Windows nodes are in use.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-3955", }, { category: "external", summary: "RHBZ#2227128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227128", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-3955", url: "https://www.cve.org/CVERecord?id=CVE-2023-3955", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-3955", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3955", }, ], release_date: "2023-08-23T13:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-27T16:08:33+00:00", details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:7515", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", }, { cve: "CVE-2023-39325", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2023-10-10T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2243296", }, ], notes: [ { category: "description", text: "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as 'Important' as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.", title: "Vulnerability description", }, { category: "summary", text: "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)", title: "Vulnerability summary", }, { category: "other", text: "This CVE is related to CVE-2023-44487.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-39325", }, { category: "external", summary: "RHBZ#2243296", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243296", }, { category: "external", summary: "RHSB-2023-003", url: "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-39325", url: "https://www.cve.org/CVERecord?id=CVE-2023-39325", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-39325", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-39325", }, { category: "external", summary: "https://access.redhat.com/security/cve/CVE-2023-44487", url: "https://access.redhat.com/security/cve/CVE-2023-44487", }, { category: "external", summary: "https://go.dev/issue/63417", url: "https://go.dev/issue/63417", }, { category: "external", summary: "https://pkg.go.dev/vuln/GO-2023-2102", url: "https://pkg.go.dev/vuln/GO-2023-2102", }, { category: "external", summary: "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487", url: "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487", }, ], release_date: "2023-10-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-27T16:08:33+00:00", details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:7515", }, { category: "workaround", details: "The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.", product_ids: [ "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)", }, ], }
rhsa-2023:7515
Vulnerability from csaf_redhat
Published
2023-11-27 16:08
Modified
2025-04-21 01:36
Summary
Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 9.0.0 security update
Notes
Topic
The components for Red Hat OpenShift for Windows Containers 9.0.0 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift for Windows Containers allows you to deploy Windows container workloads running on Windows Server nodes.
Security Fix(es):
* golang: net/http, x/net/http2: rapid stream resets can cause excessive work (Rapid Reset Attack) (CVE-2023-39325)
A Red Hat Security Bulletin which addresses further details about the Rapid Reset flaw is available in the References section.
* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3676) (CVE-2023-3955)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "The components for Red Hat OpenShift for Windows Containers 9.0.0 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Red Hat OpenShift for Windows Containers allows you to deploy Windows container workloads running on Windows Server nodes.\n\nSecurity Fix(es):\n\n* golang: net/http, x/net/http2: rapid stream resets can cause excessive work (Rapid Reset Attack) (CVE-2023-39325)\n\nA Red Hat Security Bulletin which addresses further details about the Rapid Reset flaw is available in the References section.\n\n* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3676) (CVE-2023-3955)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2023:7515", url: "https://access.redhat.com/errata/RHSA-2023:7515", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003", url: "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003", }, { category: "external", summary: "2227126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227126", }, { category: "external", summary: "2227128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227128", }, { category: "external", summary: "2243296", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243296", }, { category: "external", summary: "OCPBUGS-10222", url: "https://issues.redhat.com/browse/OCPBUGS-10222", }, { category: "external", summary: "OCPBUGS-10437", url: "https://issues.redhat.com/browse/OCPBUGS-10437", }, { category: "external", summary: "OCPBUGS-10572", url: "https://issues.redhat.com/browse/OCPBUGS-10572", }, { category: "external", summary: "OCPBUGS-11259", url: "https://issues.redhat.com/browse/OCPBUGS-11259", }, { category: "external", summary: "OCPBUGS-11306", url: "https://issues.redhat.com/browse/OCPBUGS-11306", }, { category: "external", summary: "OCPBUGS-12971", url: "https://issues.redhat.com/browse/OCPBUGS-12971", }, { category: "external", summary: "OCPBUGS-13244", url: "https://issues.redhat.com/browse/OCPBUGS-13244", }, { category: "external", summary: "OCPBUGS-13780", url: "https://issues.redhat.com/browse/OCPBUGS-13780", }, { category: "external", summary: "OCPBUGS-14700", url: "https://issues.redhat.com/browse/OCPBUGS-14700", }, { category: "external", summary: "OCPBUGS-15461", url: "https://issues.redhat.com/browse/OCPBUGS-15461", }, { category: "external", summary: "OCPBUGS-17528", url: "https://issues.redhat.com/browse/OCPBUGS-17528", }, { category: "external", summary: "OCPBUGS-19040", url: "https://issues.redhat.com/browse/OCPBUGS-19040", }, { category: "external", summary: "OCPBUGS-19949", url: "https://issues.redhat.com/browse/OCPBUGS-19949", }, { category: "external", summary: "OCPBUGS-20054", url: "https://issues.redhat.com/browse/OCPBUGS-20054", }, { category: "external", summary: "OCPBUGS-20067", url: "https://issues.redhat.com/browse/OCPBUGS-20067", }, { category: "external", summary: "OCPBUGS-20191", url: "https://issues.redhat.com/browse/OCPBUGS-20191", }, { category: "external", summary: "OCPBUGS-20664", url: "https://issues.redhat.com/browse/OCPBUGS-20664", }, { category: "external", summary: "OCPBUGS-22328", url: "https://issues.redhat.com/browse/OCPBUGS-22328", }, { category: "external", summary: "OCPBUGS-22711", url: "https://issues.redhat.com/browse/OCPBUGS-22711", }, { category: "external", summary: "WINC-1001", url: "https://issues.redhat.com/browse/WINC-1001", }, { category: "external", summary: "WINC-1003", url: "https://issues.redhat.com/browse/WINC-1003", }, { category: "external", summary: "WINC-1004", url: "https://issues.redhat.com/browse/WINC-1004", }, { category: "external", summary: "WINC-1010", url: "https://issues.redhat.com/browse/WINC-1010", }, { category: "external", summary: "WINC-1023", url: "https://issues.redhat.com/browse/WINC-1023", }, { category: "external", summary: "WINC-1025", url: "https://issues.redhat.com/browse/WINC-1025", }, { category: "external", summary: "WINC-1033", url: "https://issues.redhat.com/browse/WINC-1033", }, { category: "external", summary: "WINC-1035", url: "https://issues.redhat.com/browse/WINC-1035", }, { category: "external", summary: "WINC-1037", url: "https://issues.redhat.com/browse/WINC-1037", }, { category: "external", summary: "WINC-1040", url: "https://issues.redhat.com/browse/WINC-1040", }, { category: "external", summary: "WINC-1043", url: "https://issues.redhat.com/browse/WINC-1043", }, { category: "external", summary: "WINC-1090", url: "https://issues.redhat.com/browse/WINC-1090", }, { category: "external", summary: "WINC-1092", url: "https://issues.redhat.com/browse/WINC-1092", }, { category: "external", summary: "WINC-1098", url: "https://issues.redhat.com/browse/WINC-1098", }, { category: "external", summary: "WINC-561", url: "https://issues.redhat.com/browse/WINC-561", }, { category: "external", summary: "WINC-633", url: "https://issues.redhat.com/browse/WINC-633", }, { category: "external", summary: "WINC-635", url: "https://issues.redhat.com/browse/WINC-635", }, { category: "external", summary: "WINC-637", url: "https://issues.redhat.com/browse/WINC-637", }, { category: "external", summary: "WINC-688", url: "https://issues.redhat.com/browse/WINC-688", }, { category: "external", summary: "WINC-805", url: "https://issues.redhat.com/browse/WINC-805", }, { category: "external", summary: "WINC-860", url: "https://issues.redhat.com/browse/WINC-860", }, { category: "external", summary: "WINC-861", url: "https://issues.redhat.com/browse/WINC-861", }, { category: "external", summary: "WINC-863", url: "https://issues.redhat.com/browse/WINC-863", }, { category: "external", summary: "WINC-945", url: "https://issues.redhat.com/browse/WINC-945", }, { category: "external", summary: "WINC-948", url: "https://issues.redhat.com/browse/WINC-948", }, { category: "external", summary: "WINC-950", url: "https://issues.redhat.com/browse/WINC-950", }, { category: "external", summary: "WINC-952", url: "https://issues.redhat.com/browse/WINC-952", }, { category: "external", summary: "WINC-959", url: "https://issues.redhat.com/browse/WINC-959", }, { category: "external", summary: "WINC-998", url: "https://issues.redhat.com/browse/WINC-998", }, { category: "external", summary: "WINC-999", url: "https://issues.redhat.com/browse/WINC-999", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_7515.json", }, ], title: "Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 9.0.0 security update", tracking: { current_release_date: "2025-04-21T01:36:39+00:00", generator: { date: "2025-04-21T01:36:39+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.2", }, }, id: "RHSA-2023:7515", initial_release_date: "2023-11-27T16:08:33+00:00", revision_history: [ { date: "2023-11-27T16:08:33+00:00", number: "1", summary: "Initial version", }, { date: "2023-11-27T16:08:33+00:00", number: "2", summary: "Last updated version", }, { date: "2025-04-21T01:36:39+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat OpenShift Container Platform 4.14", product: { name: "Red Hat OpenShift Container Platform 4.14", product_id: "9Base-RHOSE-4.14", product_identification_helper: { cpe: "cpe:/a:redhat:openshift:4.14::el9", }, }, }, ], category: "product_family", name: "Red Hat OpenShift Enterprise", }, { branches: [ { category: "product_version", name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", product: { name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", product_id: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f?arch=amd64&repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-operator-bundle&tag=v9.0.0-104", }, }, }, { category: "product_version", name: "openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", product: { name: "openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", product_id: "openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f?arch=amd64&repository_url=registry.redhat.io/openshift4/windows-machine-config-operator-bundle&tag=v9.0.0-104", }, }, }, { category: "product_version", name: "openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", product: { name: "openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", product_id: "openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c?arch=amd64&repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-rhel9-operator&tag=9.0.0-105", }, }, }, ], category: "architecture", name: "amd64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64 as a component of Red Hat OpenShift Container Platform 4.14", product_id: "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", }, product_reference: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", relates_to_product_reference: "9Base-RHOSE-4.14", }, { category: "default_component_of", full_product_name: { name: "openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64 as a component of Red Hat OpenShift Container Platform 4.14", product_id: "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", }, product_reference: "openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", relates_to_product_reference: "9Base-RHOSE-4.14", }, { category: "default_component_of", full_product_name: { name: "openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64 as a component of Red Hat OpenShift Container Platform 4.14", product_id: "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", }, product_reference: "openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", relates_to_product_reference: "9Base-RHOSE-4.14", }, ], }, vulnerabilities: [ { cve: "CVE-2023-3676", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, discovery_date: "2023-07-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2227126", }, ], notes: [ { category: "description", text: "A vulnerability was found in Kubernetes. This flaw allows a user who can create pods on Windows nodes to escalate to admin privileges on those nodes.", title: "Vulnerability description", }, { category: "summary", text: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", title: "Vulnerability summary", }, { category: "other", text: "Kubernetes clusters are only affected if they include Windows nodes. Any Kubernetes environment with Windows nodes is impacted. Run kubectl get nodes -l kubernetes.io/os=windows to see if any Windows nodes are in use.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-3676", }, { category: "external", summary: "RHBZ#2227126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227126", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-3676", url: "https://www.cve.org/CVERecord?id=CVE-2023-3676", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-3676", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3676", }, ], release_date: "2023-08-23T13:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-27T16:08:33+00:00", details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:7515", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", }, { cve: "CVE-2023-3955", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, discovery_date: "2023-07-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2227128", }, ], notes: [ { category: "description", text: "A vulnerability was found in Kubernetes. This flaw allows a user who can create pods on Windows nodes to escalate to admin privileges on those nodes.", title: "Vulnerability description", }, { category: "summary", text: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", title: "Vulnerability summary", }, { category: "other", text: "Kubernetes clusters are only affected if they include Windows nodes. Any Kubernetes environment with Windows nodes is impacted. Run kubectl get nodes -l kubernetes.io/os=windows to see if any Windows nodes are in use.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-3955", }, { category: "external", summary: "RHBZ#2227128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227128", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-3955", url: "https://www.cve.org/CVERecord?id=CVE-2023-3955", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-3955", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3955", }, ], release_date: "2023-08-23T13:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-27T16:08:33+00:00", details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:7515", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", }, { cve: "CVE-2023-39325", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2023-10-10T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2243296", }, ], notes: [ { category: "description", text: "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as 'Important' as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.", title: "Vulnerability description", }, { category: "summary", text: "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)", title: "Vulnerability summary", }, { category: "other", text: "This CVE is related to CVE-2023-44487.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-39325", }, { category: "external", summary: "RHBZ#2243296", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243296", }, { category: "external", summary: "RHSB-2023-003", url: "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-39325", url: "https://www.cve.org/CVERecord?id=CVE-2023-39325", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-39325", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-39325", }, { category: "external", summary: "https://access.redhat.com/security/cve/CVE-2023-44487", url: "https://access.redhat.com/security/cve/CVE-2023-44487", }, { category: "external", summary: "https://go.dev/issue/63417", url: "https://go.dev/issue/63417", }, { category: "external", summary: "https://pkg.go.dev/vuln/GO-2023-2102", url: "https://pkg.go.dev/vuln/GO-2023-2102", }, { category: "external", summary: "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487", url: "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487", }, ], release_date: "2023-10-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-27T16:08:33+00:00", details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:7515", }, { category: "workaround", details: "The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.", product_ids: [ "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)", }, ], }
rhsa-2023:4780
Vulnerability from csaf_redhat
Published
2023-08-28 17:53
Modified
2024-11-22 22:16
Summary
Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 6.0.2 security update
Notes
Topic
The components for Red Hat OpenShift support for Windows Containers 6.0.2 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift support for Windows Containers allows you to deploy Windows container workloads running on Windows Server containers.
Security Fix(es):
* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3676)
* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3955)
For more details about the security issue(s), including the impact, CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "The components for Red Hat OpenShift support for Windows Containers 6.0.2 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Red Hat OpenShift support for Windows Containers allows you to deploy Windows container workloads running on Windows Server containers.\n\nSecurity Fix(es):\n\n* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3676)\n\n* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3955)\n\nFor more details about the security issue(s), including the impact, CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2023:4780", url: "https://access.redhat.com/errata/RHSA-2023:4780", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "2227126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227126", }, { category: "external", summary: "2227128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227128", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_4780.json", }, ], title: "Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 6.0.2 security update", tracking: { current_release_date: "2024-11-22T22:16:19+00:00", generator: { date: "2024-11-22T22:16:19+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2023:4780", initial_release_date: "2023-08-28T17:53:25+00:00", revision_history: [ { date: "2023-08-28T17:53:25+00:00", number: "1", summary: "Initial version", }, { date: "2023-08-28T17:53:25+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T22:16:19+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat OpenShift Container Platform 4.11", product: { name: "Red Hat OpenShift Container Platform 4.11", product_id: "8Base-RHOSE-4.11", product_identification_helper: { cpe: "cpe:/a:redhat:openshift:4.11::el8", }, }, }, ], category: "product_family", name: "Red Hat OpenShift Enterprise", }, { branches: [ { category: "product_version", name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d_amd64", product: { name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d_amd64", product_id: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d?arch=amd64&repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-operator-bundle&tag=v6.0.2-5", }, }, }, { category: "product_version", name: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", product: { name: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", product_id: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e?arch=amd64&repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-rhel8-operator&tag=6.0.2-5", }, }, }, ], category: "architecture", name: "amd64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d_amd64 as a component of Red Hat OpenShift Container Platform 4.11", product_id: "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d_amd64", }, product_reference: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d_amd64", relates_to_product_reference: "8Base-RHOSE-4.11", }, { category: "default_component_of", full_product_name: { name: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64 as a component of Red Hat OpenShift Container Platform 4.11", product_id: "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", }, product_reference: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", relates_to_product_reference: "8Base-RHOSE-4.11", }, ], }, vulnerabilities: [ { cve: "CVE-2023-3676", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, discovery_date: "2023-07-28T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d_amd64", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2227126", }, ], notes: [ { category: "description", text: "A vulnerability was found in Kubernetes. This flaw allows a user who can create pods on Windows nodes to escalate to admin privileges on those nodes.", title: "Vulnerability description", }, { category: "summary", text: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", title: "Vulnerability summary", }, { category: "other", text: "Kubernetes clusters are only affected if they include Windows nodes. Any Kubernetes environment with Windows nodes is impacted. Run kubectl get nodes -l kubernetes.io/os=windows to see if any Windows nodes are in use.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", ], known_not_affected: [ "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-3676", }, { category: "external", summary: "RHBZ#2227126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227126", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-3676", url: "https://www.cve.org/CVERecord?id=CVE-2023-3676", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-3676", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3676", }, ], release_date: "2023-08-23T13:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-08-28T17:53:25+00:00", details: "For Windows Machine Config Operator upgrades, see the following documentation:\nhttps://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", product_ids: [ "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:4780", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", }, { cve: "CVE-2023-3955", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, discovery_date: "2023-07-28T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d_amd64", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2227128", }, ], notes: [ { category: "description", text: "A vulnerability was found in Kubernetes. This flaw allows a user who can create pods on Windows nodes to escalate to admin privileges on those nodes.", title: "Vulnerability description", }, { category: "summary", text: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", title: "Vulnerability summary", }, { category: "other", text: "Kubernetes clusters are only affected if they include Windows nodes. Any Kubernetes environment with Windows nodes is impacted. Run kubectl get nodes -l kubernetes.io/os=windows to see if any Windows nodes are in use.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", ], known_not_affected: [ "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-3955", }, { category: "external", summary: "RHBZ#2227128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227128", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-3955", url: "https://www.cve.org/CVERecord?id=CVE-2023-3955", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-3955", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3955", }, ], release_date: "2023-08-23T13:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-08-28T17:53:25+00:00", details: "For Windows Machine Config Operator upgrades, see the following documentation:\nhttps://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", product_ids: [ "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:4780", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", }, ], }
rhsa-2023_4780
Vulnerability from csaf_redhat
Published
2023-08-28 17:53
Modified
2024-11-22 22:16
Summary
Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 6.0.2 security update
Notes
Topic
The components for Red Hat OpenShift support for Windows Containers 6.0.2 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift support for Windows Containers allows you to deploy Windows container workloads running on Windows Server containers.
Security Fix(es):
* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3676)
* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3955)
For more details about the security issue(s), including the impact, CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "The components for Red Hat OpenShift support for Windows Containers 6.0.2 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Red Hat OpenShift support for Windows Containers allows you to deploy Windows container workloads running on Windows Server containers.\n\nSecurity Fix(es):\n\n* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3676)\n\n* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3955)\n\nFor more details about the security issue(s), including the impact, CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2023:4780", url: "https://access.redhat.com/errata/RHSA-2023:4780", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "2227126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227126", }, { category: "external", summary: "2227128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227128", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_4780.json", }, ], title: "Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 6.0.2 security update", tracking: { current_release_date: "2024-11-22T22:16:19+00:00", generator: { date: "2024-11-22T22:16:19+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2023:4780", initial_release_date: "2023-08-28T17:53:25+00:00", revision_history: [ { date: "2023-08-28T17:53:25+00:00", number: "1", summary: "Initial version", }, { date: "2023-08-28T17:53:25+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T22:16:19+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat OpenShift Container Platform 4.11", product: { name: "Red Hat OpenShift Container Platform 4.11", product_id: "8Base-RHOSE-4.11", product_identification_helper: { cpe: "cpe:/a:redhat:openshift:4.11::el8", }, }, }, ], category: "product_family", name: "Red Hat OpenShift Enterprise", }, { branches: [ { category: "product_version", name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d_amd64", product: { name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d_amd64", product_id: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d?arch=amd64&repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-operator-bundle&tag=v6.0.2-5", }, }, }, { category: "product_version", name: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", product: { name: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", product_id: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e?arch=amd64&repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-rhel8-operator&tag=6.0.2-5", }, }, }, ], category: "architecture", name: "amd64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d_amd64 as a component of Red Hat OpenShift Container Platform 4.11", product_id: "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d_amd64", }, product_reference: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d_amd64", relates_to_product_reference: "8Base-RHOSE-4.11", }, { category: "default_component_of", full_product_name: { name: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64 as a component of Red Hat OpenShift Container Platform 4.11", product_id: "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", }, product_reference: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", relates_to_product_reference: "8Base-RHOSE-4.11", }, ], }, vulnerabilities: [ { cve: "CVE-2023-3676", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, discovery_date: "2023-07-28T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d_amd64", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2227126", }, ], notes: [ { category: "description", text: "A vulnerability was found in Kubernetes. This flaw allows a user who can create pods on Windows nodes to escalate to admin privileges on those nodes.", title: "Vulnerability description", }, { category: "summary", text: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", title: "Vulnerability summary", }, { category: "other", text: "Kubernetes clusters are only affected if they include Windows nodes. Any Kubernetes environment with Windows nodes is impacted. Run kubectl get nodes -l kubernetes.io/os=windows to see if any Windows nodes are in use.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", ], known_not_affected: [ "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-3676", }, { category: "external", summary: "RHBZ#2227126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227126", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-3676", url: "https://www.cve.org/CVERecord?id=CVE-2023-3676", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-3676", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3676", }, ], release_date: "2023-08-23T13:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-08-28T17:53:25+00:00", details: "For Windows Machine Config Operator upgrades, see the following documentation:\nhttps://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", product_ids: [ "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:4780", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", }, { cve: "CVE-2023-3955", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, discovery_date: "2023-07-28T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d_amd64", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2227128", }, ], notes: [ { category: "description", text: "A vulnerability was found in Kubernetes. This flaw allows a user who can create pods on Windows nodes to escalate to admin privileges on those nodes.", title: "Vulnerability description", }, { category: "summary", text: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", title: "Vulnerability summary", }, { category: "other", text: "Kubernetes clusters are only affected if they include Windows nodes. Any Kubernetes environment with Windows nodes is impacted. Run kubectl get nodes -l kubernetes.io/os=windows to see if any Windows nodes are in use.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", ], known_not_affected: [ "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-operator-bundle@sha256:818d1cacc1152020239e0234e6d350bc4394ffc7de2ebfec579b460b35d7d69d_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-3955", }, { category: "external", summary: "RHBZ#2227128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227128", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-3955", url: "https://www.cve.org/CVERecord?id=CVE-2023-3955", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-3955", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3955", }, ], release_date: "2023-08-23T13:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-08-28T17:53:25+00:00", details: "For Windows Machine Config Operator upgrades, see the following documentation:\nhttps://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", product_ids: [ "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:4780", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "8Base-RHOSE-4.11:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:bb7f3f8760a1a092a343423164c2ed9dbd8b346e86153aa849b667d17ec3c31e_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", }, ], }
rhsa-2023:4885
Vulnerability from csaf_redhat
Published
2023-08-30 16:33
Modified
2024-11-22 22:16
Summary
Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 8.0.2 security update
Notes
Topic
The components for Red Hat OpenShift support for Windows Containers 8.0.2 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift support for Windows Containers allows you to deploy Windows container workloads running on Windows Server containers.
Security Fix(es):
* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3676)
* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3955)
For more details about the security issue(s), including the impact, CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "The components for Red Hat OpenShift support for Windows Containers 8.0.2 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Red Hat OpenShift support for Windows Containers allows you to deploy Windows container workloads running on Windows Server containers.\n\nSecurity Fix(es):\n\n* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3676)\n\n* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3955)\n\nFor more details about the security issue(s), including the impact, CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2023:4885", url: "https://access.redhat.com/errata/RHSA-2023:4885", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "2227126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227126", }, { category: "external", summary: "2227128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227128", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_4885.json", }, ], title: "Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 8.0.2 security update", tracking: { current_release_date: "2024-11-22T22:16:36+00:00", generator: { date: "2024-11-22T22:16:36+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2023:4885", initial_release_date: "2023-08-30T16:33:47+00:00", revision_history: [ { date: "2023-08-30T16:33:47+00:00", number: "1", summary: "Initial version", }, { date: "2023-08-30T16:33:47+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T22:16:36+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat OpenShift Container Platform 4.13", product: { name: "Red Hat OpenShift Container Platform 4.13", product_id: "9Base-RHOSE-4.13", product_identification_helper: { cpe: "cpe:/a:redhat:openshift:4.13::el9", }, }, }, ], category: "product_family", name: "Red Hat OpenShift Enterprise", }, { branches: [ { category: "product_version", name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62_amd64", product: { name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62_amd64", product_id: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62?arch=amd64&repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-operator-bundle&tag=v8.0.2-9", }, }, }, { category: "product_version", name: "openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", product: { name: "openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", product_id: "openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e?arch=amd64&repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-rhel9-operator&tag=8.0.2-9", }, }, }, ], category: "architecture", name: "amd64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62_amd64 as a component of Red Hat OpenShift Container Platform 4.13", product_id: "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62_amd64", }, product_reference: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62_amd64", relates_to_product_reference: "9Base-RHOSE-4.13", }, { category: "default_component_of", full_product_name: { name: "openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64 as a component of Red Hat OpenShift Container Platform 4.13", product_id: "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", }, product_reference: "openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", relates_to_product_reference: "9Base-RHOSE-4.13", }, ], }, vulnerabilities: [ { cve: "CVE-2023-3676", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, discovery_date: "2023-07-28T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62_amd64", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2227126", }, ], notes: [ { category: "description", text: "A vulnerability was found in Kubernetes. This flaw allows a user who can create pods on Windows nodes to escalate to admin privileges on those nodes.", title: "Vulnerability description", }, { category: "summary", text: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", title: "Vulnerability summary", }, { category: "other", text: "Kubernetes clusters are only affected if they include Windows nodes. Any Kubernetes environment with Windows nodes is impacted. Run kubectl get nodes -l kubernetes.io/os=windows to see if any Windows nodes are in use.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", ], known_not_affected: [ "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-3676", }, { category: "external", summary: "RHBZ#2227126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227126", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-3676", url: "https://www.cve.org/CVERecord?id=CVE-2023-3676", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-3676", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3676", }, ], release_date: "2023-08-23T13:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-08-30T16:33:47+00:00", details: "For Windows Machine Config Operator upgrades, see the following documentation:\nhttps://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", product_ids: [ "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:4885", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", }, { cve: "CVE-2023-3955", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, discovery_date: "2023-07-28T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62_amd64", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2227128", }, ], notes: [ { category: "description", text: "A vulnerability was found in Kubernetes. This flaw allows a user who can create pods on Windows nodes to escalate to admin privileges on those nodes.", title: "Vulnerability description", }, { category: "summary", text: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", title: "Vulnerability summary", }, { category: "other", text: "Kubernetes clusters are only affected if they include Windows nodes. Any Kubernetes environment with Windows nodes is impacted. Run kubectl get nodes -l kubernetes.io/os=windows to see if any Windows nodes are in use.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", ], known_not_affected: [ "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-3955", }, { category: "external", summary: "RHBZ#2227128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227128", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-3955", url: "https://www.cve.org/CVERecord?id=CVE-2023-3955", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-3955", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3955", }, ], release_date: "2023-08-23T13:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-08-30T16:33:47+00:00", details: "For Windows Machine Config Operator upgrades, see the following documentation:\nhttps://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", product_ids: [ "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:4885", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", }, ], }
rhsa-2023_4885
Vulnerability from csaf_redhat
Published
2023-08-30 16:33
Modified
2024-11-22 22:16
Summary
Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 8.0.2 security update
Notes
Topic
The components for Red Hat OpenShift support for Windows Containers 8.0.2 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift support for Windows Containers allows you to deploy Windows container workloads running on Windows Server containers.
Security Fix(es):
* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3676)
* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3955)
For more details about the security issue(s), including the impact, CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "The components for Red Hat OpenShift support for Windows Containers 8.0.2 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Red Hat OpenShift support for Windows Containers allows you to deploy Windows container workloads running on Windows Server containers.\n\nSecurity Fix(es):\n\n* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3676)\n\n* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3955)\n\nFor more details about the security issue(s), including the impact, CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2023:4885", url: "https://access.redhat.com/errata/RHSA-2023:4885", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "2227126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227126", }, { category: "external", summary: "2227128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227128", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_4885.json", }, ], title: "Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 8.0.2 security update", tracking: { current_release_date: "2024-11-22T22:16:36+00:00", generator: { date: "2024-11-22T22:16:36+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2023:4885", initial_release_date: "2023-08-30T16:33:47+00:00", revision_history: [ { date: "2023-08-30T16:33:47+00:00", number: "1", summary: "Initial version", }, { date: "2023-08-30T16:33:47+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T22:16:36+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat OpenShift Container Platform 4.13", product: { name: "Red Hat OpenShift Container Platform 4.13", product_id: "9Base-RHOSE-4.13", product_identification_helper: { cpe: "cpe:/a:redhat:openshift:4.13::el9", }, }, }, ], category: "product_family", name: "Red Hat OpenShift Enterprise", }, { branches: [ { category: "product_version", name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62_amd64", product: { name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62_amd64", product_id: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62?arch=amd64&repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-operator-bundle&tag=v8.0.2-9", }, }, }, { category: "product_version", name: "openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", product: { name: "openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", product_id: "openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e?arch=amd64&repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-rhel9-operator&tag=8.0.2-9", }, }, }, ], category: "architecture", name: "amd64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62_amd64 as a component of Red Hat OpenShift Container Platform 4.13", product_id: "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62_amd64", }, product_reference: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62_amd64", relates_to_product_reference: "9Base-RHOSE-4.13", }, { category: "default_component_of", full_product_name: { name: "openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64 as a component of Red Hat OpenShift Container Platform 4.13", product_id: "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", }, product_reference: "openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", relates_to_product_reference: "9Base-RHOSE-4.13", }, ], }, vulnerabilities: [ { cve: "CVE-2023-3676", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, discovery_date: "2023-07-28T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62_amd64", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2227126", }, ], notes: [ { category: "description", text: "A vulnerability was found in Kubernetes. This flaw allows a user who can create pods on Windows nodes to escalate to admin privileges on those nodes.", title: "Vulnerability description", }, { category: "summary", text: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", title: "Vulnerability summary", }, { category: "other", text: "Kubernetes clusters are only affected if they include Windows nodes. Any Kubernetes environment with Windows nodes is impacted. Run kubectl get nodes -l kubernetes.io/os=windows to see if any Windows nodes are in use.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", ], known_not_affected: [ "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-3676", }, { category: "external", summary: "RHBZ#2227126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227126", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-3676", url: "https://www.cve.org/CVERecord?id=CVE-2023-3676", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-3676", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3676", }, ], release_date: "2023-08-23T13:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-08-30T16:33:47+00:00", details: "For Windows Machine Config Operator upgrades, see the following documentation:\nhttps://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", product_ids: [ "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:4885", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", }, { cve: "CVE-2023-3955", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, discovery_date: "2023-07-28T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62_amd64", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2227128", }, ], notes: [ { category: "description", text: "A vulnerability was found in Kubernetes. This flaw allows a user who can create pods on Windows nodes to escalate to admin privileges on those nodes.", title: "Vulnerability description", }, { category: "summary", text: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", title: "Vulnerability summary", }, { category: "other", text: "Kubernetes clusters are only affected if they include Windows nodes. Any Kubernetes environment with Windows nodes is impacted. Run kubectl get nodes -l kubernetes.io/os=windows to see if any Windows nodes are in use.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", ], known_not_affected: [ "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-3955", }, { category: "external", summary: "RHBZ#2227128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227128", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-3955", url: "https://www.cve.org/CVERecord?id=CVE-2023-3955", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-3955", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3955", }, ], release_date: "2023-08-23T13:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-08-30T16:33:47+00:00", details: "For Windows Machine Config Operator upgrades, see the following documentation:\nhttps://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", product_ids: [ "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:4885", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", }, ], }
RHSA-2023:7515
Vulnerability from csaf_redhat
Published
2023-11-27 16:08
Modified
2025-04-21 01:36
Summary
Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 9.0.0 security update
Notes
Topic
The components for Red Hat OpenShift for Windows Containers 9.0.0 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift for Windows Containers allows you to deploy Windows container workloads running on Windows Server nodes.
Security Fix(es):
* golang: net/http, x/net/http2: rapid stream resets can cause excessive work (Rapid Reset Attack) (CVE-2023-39325)
A Red Hat Security Bulletin which addresses further details about the Rapid Reset flaw is available in the References section.
* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3676) (CVE-2023-3955)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "The components for Red Hat OpenShift for Windows Containers 9.0.0 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Red Hat OpenShift for Windows Containers allows you to deploy Windows container workloads running on Windows Server nodes.\n\nSecurity Fix(es):\n\n* golang: net/http, x/net/http2: rapid stream resets can cause excessive work (Rapid Reset Attack) (CVE-2023-39325)\n\nA Red Hat Security Bulletin which addresses further details about the Rapid Reset flaw is available in the References section.\n\n* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3676) (CVE-2023-3955)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2023:7515", url: "https://access.redhat.com/errata/RHSA-2023:7515", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003", url: "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003", }, { category: "external", summary: "2227126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227126", }, { category: "external", summary: "2227128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227128", }, { category: "external", summary: "2243296", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243296", }, { category: "external", summary: "OCPBUGS-10222", url: "https://issues.redhat.com/browse/OCPBUGS-10222", }, { category: "external", summary: "OCPBUGS-10437", url: "https://issues.redhat.com/browse/OCPBUGS-10437", }, { category: "external", summary: "OCPBUGS-10572", url: "https://issues.redhat.com/browse/OCPBUGS-10572", }, { category: "external", summary: "OCPBUGS-11259", url: "https://issues.redhat.com/browse/OCPBUGS-11259", }, { category: "external", summary: "OCPBUGS-11306", url: "https://issues.redhat.com/browse/OCPBUGS-11306", }, { category: "external", summary: "OCPBUGS-12971", url: "https://issues.redhat.com/browse/OCPBUGS-12971", }, { category: "external", summary: "OCPBUGS-13244", url: "https://issues.redhat.com/browse/OCPBUGS-13244", }, { category: "external", summary: "OCPBUGS-13780", url: "https://issues.redhat.com/browse/OCPBUGS-13780", }, { category: "external", summary: "OCPBUGS-14700", url: "https://issues.redhat.com/browse/OCPBUGS-14700", }, { category: "external", summary: "OCPBUGS-15461", url: "https://issues.redhat.com/browse/OCPBUGS-15461", }, { category: "external", summary: "OCPBUGS-17528", url: "https://issues.redhat.com/browse/OCPBUGS-17528", }, { category: "external", summary: "OCPBUGS-19040", url: "https://issues.redhat.com/browse/OCPBUGS-19040", }, { category: "external", summary: "OCPBUGS-19949", url: "https://issues.redhat.com/browse/OCPBUGS-19949", }, { category: "external", summary: "OCPBUGS-20054", url: "https://issues.redhat.com/browse/OCPBUGS-20054", }, { category: "external", summary: "OCPBUGS-20067", url: "https://issues.redhat.com/browse/OCPBUGS-20067", }, { category: "external", summary: "OCPBUGS-20191", url: "https://issues.redhat.com/browse/OCPBUGS-20191", }, { category: "external", summary: "OCPBUGS-20664", url: "https://issues.redhat.com/browse/OCPBUGS-20664", }, { category: "external", summary: "OCPBUGS-22328", url: "https://issues.redhat.com/browse/OCPBUGS-22328", }, { category: "external", summary: "OCPBUGS-22711", url: "https://issues.redhat.com/browse/OCPBUGS-22711", }, { category: "external", summary: "WINC-1001", url: "https://issues.redhat.com/browse/WINC-1001", }, { category: "external", summary: "WINC-1003", url: "https://issues.redhat.com/browse/WINC-1003", }, { category: "external", summary: "WINC-1004", url: "https://issues.redhat.com/browse/WINC-1004", }, { category: "external", summary: "WINC-1010", url: "https://issues.redhat.com/browse/WINC-1010", }, { category: "external", summary: "WINC-1023", url: "https://issues.redhat.com/browse/WINC-1023", }, { category: "external", summary: "WINC-1025", url: "https://issues.redhat.com/browse/WINC-1025", }, { category: "external", summary: "WINC-1033", url: "https://issues.redhat.com/browse/WINC-1033", }, { category: "external", summary: "WINC-1035", url: "https://issues.redhat.com/browse/WINC-1035", }, { category: "external", summary: "WINC-1037", url: "https://issues.redhat.com/browse/WINC-1037", }, { category: "external", summary: "WINC-1040", url: "https://issues.redhat.com/browse/WINC-1040", }, { category: "external", summary: "WINC-1043", url: "https://issues.redhat.com/browse/WINC-1043", }, { category: "external", summary: "WINC-1090", url: "https://issues.redhat.com/browse/WINC-1090", }, { category: "external", summary: "WINC-1092", url: "https://issues.redhat.com/browse/WINC-1092", }, { category: "external", summary: "WINC-1098", url: "https://issues.redhat.com/browse/WINC-1098", }, { category: "external", summary: "WINC-561", url: "https://issues.redhat.com/browse/WINC-561", }, { category: "external", summary: "WINC-633", url: "https://issues.redhat.com/browse/WINC-633", }, { category: "external", summary: "WINC-635", url: "https://issues.redhat.com/browse/WINC-635", }, { category: "external", summary: "WINC-637", url: "https://issues.redhat.com/browse/WINC-637", }, { category: "external", summary: "WINC-688", url: "https://issues.redhat.com/browse/WINC-688", }, { category: "external", summary: "WINC-805", url: "https://issues.redhat.com/browse/WINC-805", }, { category: "external", summary: "WINC-860", url: "https://issues.redhat.com/browse/WINC-860", }, { category: "external", summary: "WINC-861", url: "https://issues.redhat.com/browse/WINC-861", }, { category: "external", summary: "WINC-863", url: "https://issues.redhat.com/browse/WINC-863", }, { category: "external", summary: "WINC-945", url: "https://issues.redhat.com/browse/WINC-945", }, { category: "external", summary: "WINC-948", url: "https://issues.redhat.com/browse/WINC-948", }, { category: "external", summary: "WINC-950", url: "https://issues.redhat.com/browse/WINC-950", }, { category: "external", summary: "WINC-952", url: "https://issues.redhat.com/browse/WINC-952", }, { category: "external", summary: "WINC-959", url: "https://issues.redhat.com/browse/WINC-959", }, { category: "external", summary: "WINC-998", url: "https://issues.redhat.com/browse/WINC-998", }, { category: "external", summary: "WINC-999", url: "https://issues.redhat.com/browse/WINC-999", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_7515.json", }, ], title: "Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 9.0.0 security update", tracking: { current_release_date: "2025-04-21T01:36:39+00:00", generator: { date: "2025-04-21T01:36:39+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.2", }, }, id: "RHSA-2023:7515", initial_release_date: "2023-11-27T16:08:33+00:00", revision_history: [ { date: "2023-11-27T16:08:33+00:00", number: "1", summary: "Initial version", }, { date: "2023-11-27T16:08:33+00:00", number: "2", summary: "Last updated version", }, { date: "2025-04-21T01:36:39+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat OpenShift Container Platform 4.14", product: { name: "Red Hat OpenShift Container Platform 4.14", product_id: "9Base-RHOSE-4.14", product_identification_helper: { cpe: "cpe:/a:redhat:openshift:4.14::el9", }, }, }, ], category: "product_family", name: "Red Hat OpenShift Enterprise", }, { branches: [ { category: "product_version", name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", product: { name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", product_id: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f?arch=amd64&repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-operator-bundle&tag=v9.0.0-104", }, }, }, { category: "product_version", name: "openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", product: { name: "openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", product_id: "openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f?arch=amd64&repository_url=registry.redhat.io/openshift4/windows-machine-config-operator-bundle&tag=v9.0.0-104", }, }, }, { category: "product_version", name: "openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", product: { name: "openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", product_id: "openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c?arch=amd64&repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-rhel9-operator&tag=9.0.0-105", }, }, }, ], category: "architecture", name: "amd64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64 as a component of Red Hat OpenShift Container Platform 4.14", product_id: "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", }, product_reference: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", relates_to_product_reference: "9Base-RHOSE-4.14", }, { category: "default_component_of", full_product_name: { name: "openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64 as a component of Red Hat OpenShift Container Platform 4.14", product_id: "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", }, product_reference: "openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", relates_to_product_reference: "9Base-RHOSE-4.14", }, { category: "default_component_of", full_product_name: { name: "openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64 as a component of Red Hat OpenShift Container Platform 4.14", product_id: "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", }, product_reference: "openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", relates_to_product_reference: "9Base-RHOSE-4.14", }, ], }, vulnerabilities: [ { cve: "CVE-2023-3676", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, discovery_date: "2023-07-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2227126", }, ], notes: [ { category: "description", text: "A vulnerability was found in Kubernetes. This flaw allows a user who can create pods on Windows nodes to escalate to admin privileges on those nodes.", title: "Vulnerability description", }, { category: "summary", text: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", title: "Vulnerability summary", }, { category: "other", text: "Kubernetes clusters are only affected if they include Windows nodes. Any Kubernetes environment with Windows nodes is impacted. Run kubectl get nodes -l kubernetes.io/os=windows to see if any Windows nodes are in use.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-3676", }, { category: "external", summary: "RHBZ#2227126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227126", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-3676", url: "https://www.cve.org/CVERecord?id=CVE-2023-3676", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-3676", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3676", }, ], release_date: "2023-08-23T13:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-27T16:08:33+00:00", details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:7515", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", }, { cve: "CVE-2023-3955", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, discovery_date: "2023-07-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2227128", }, ], notes: [ { category: "description", text: "A vulnerability was found in Kubernetes. This flaw allows a user who can create pods on Windows nodes to escalate to admin privileges on those nodes.", title: "Vulnerability description", }, { category: "summary", text: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", title: "Vulnerability summary", }, { category: "other", text: "Kubernetes clusters are only affected if they include Windows nodes. Any Kubernetes environment with Windows nodes is impacted. Run kubectl get nodes -l kubernetes.io/os=windows to see if any Windows nodes are in use.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-3955", }, { category: "external", summary: "RHBZ#2227128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227128", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-3955", url: "https://www.cve.org/CVERecord?id=CVE-2023-3955", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-3955", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3955", }, ], release_date: "2023-08-23T13:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-27T16:08:33+00:00", details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:7515", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", }, { cve: "CVE-2023-39325", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2023-10-10T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2243296", }, ], notes: [ { category: "description", text: "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as 'Important' as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.", title: "Vulnerability description", }, { category: "summary", text: "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)", title: "Vulnerability summary", }, { category: "other", text: "This CVE is related to CVE-2023-44487.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-39325", }, { category: "external", summary: "RHBZ#2243296", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243296", }, { category: "external", summary: "RHSB-2023-003", url: "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-39325", url: "https://www.cve.org/CVERecord?id=CVE-2023-39325", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-39325", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-39325", }, { category: "external", summary: "https://access.redhat.com/security/cve/CVE-2023-44487", url: "https://access.redhat.com/security/cve/CVE-2023-44487", }, { category: "external", summary: "https://go.dev/issue/63417", url: "https://go.dev/issue/63417", }, { category: "external", summary: "https://pkg.go.dev/vuln/GO-2023-2102", url: "https://pkg.go.dev/vuln/GO-2023-2102", }, { category: "external", summary: "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487", url: "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487", }, ], release_date: "2023-10-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-11-27T16:08:33+00:00", details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:7515", }, { category: "workaround", details: "The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.", product_ids: [ "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", "9Base-RHOSE-4.14:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:ae6b81b631c16ae515ef4adb40159669a8051a670d88d7b762ff56ae6e09031c_amd64", "9Base-RHOSE-4.14:openshift4/windows-machine-config-operator-bundle@sha256:d45504b2b477258f723c3c91a353e1100c9679a67730911f87225da7dd76230f_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)", }, ], }
rhsa-2023:4835
Vulnerability from csaf_redhat
Published
2023-08-29 09:24
Modified
2024-11-22 22:16
Summary
Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 5.1.2 security update
Notes
Topic
The components for Red Hat OpenShift support for Windows Containers 5.1.2 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift support for Windows Containers allows you to deploy Windows container workloads running on Windows Server containers.
Security Fix(es):
* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3676)
* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3955)
For more details about the security issue(s), including the impact, CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "The components for Red Hat OpenShift support for Windows Containers 5.1.2 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Red Hat OpenShift support for Windows Containers allows you to deploy Windows container workloads running on Windows Server containers.\n\nSecurity Fix(es):\n\n* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3676)\n\n* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3955)\n\nFor more details about the security issue(s), including the impact, CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2023:4835", url: "https://access.redhat.com/errata/RHSA-2023:4835", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "2227126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227126", }, { category: "external", summary: "2227128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227128", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_4835.json", }, ], title: "Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 5.1.2 security update", tracking: { current_release_date: "2024-11-22T22:16:28+00:00", generator: { date: "2024-11-22T22:16:28+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2023:4835", initial_release_date: "2023-08-29T09:24:51+00:00", revision_history: [ { date: "2023-08-29T09:24:51+00:00", number: "1", summary: "Initial version", }, { date: "2023-08-29T09:24:51+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T22:16:28+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat OpenShift Container Platform 4.10", product: { name: "Red Hat OpenShift Container Platform 4.10", product_id: "8Base-RHOSE-4.10", product_identification_helper: { cpe: "cpe:/a:redhat:openshift:4.10::el8", }, }, }, ], category: "product_family", name: "Red Hat OpenShift Enterprise", }, { branches: [ { category: "product_version", name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba_amd64", product: { name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba_amd64", product_id: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba?arch=amd64&repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-operator-bundle&tag=v5.1.2-2", }, }, }, { category: "product_version", name: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", product: { name: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", product_id: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e?arch=amd64&repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-rhel8-operator&tag=5.1.2-3", }, }, }, ], category: "architecture", name: "amd64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba_amd64 as a component of Red Hat OpenShift Container Platform 4.10", product_id: "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba_amd64", }, product_reference: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba_amd64", relates_to_product_reference: "8Base-RHOSE-4.10", }, { category: "default_component_of", full_product_name: { name: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64 as a component of Red Hat OpenShift Container Platform 4.10", product_id: "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", }, product_reference: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", relates_to_product_reference: "8Base-RHOSE-4.10", }, ], }, vulnerabilities: [ { cve: "CVE-2023-3676", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, discovery_date: "2023-07-28T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba_amd64", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2227126", }, ], notes: [ { category: "description", text: "A vulnerability was found in Kubernetes. This flaw allows a user who can create pods on Windows nodes to escalate to admin privileges on those nodes.", title: "Vulnerability description", }, { category: "summary", text: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", title: "Vulnerability summary", }, { category: "other", text: "Kubernetes clusters are only affected if they include Windows nodes. Any Kubernetes environment with Windows nodes is impacted. Run kubectl get nodes -l kubernetes.io/os=windows to see if any Windows nodes are in use.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", ], known_not_affected: [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-3676", }, { category: "external", summary: "RHBZ#2227126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227126", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-3676", url: "https://www.cve.org/CVERecord?id=CVE-2023-3676", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-3676", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3676", }, ], release_date: "2023-08-23T13:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-08-29T09:24:51+00:00", details: "For Windows Machine Config Operator upgrades, see the following documentation: \nhttps://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", product_ids: [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:4835", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", }, { cve: "CVE-2023-3955", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, discovery_date: "2023-07-28T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba_amd64", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2227128", }, ], notes: [ { category: "description", text: "A vulnerability was found in Kubernetes. This flaw allows a user who can create pods on Windows nodes to escalate to admin privileges on those nodes.", title: "Vulnerability description", }, { category: "summary", text: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", title: "Vulnerability summary", }, { category: "other", text: "Kubernetes clusters are only affected if they include Windows nodes. Any Kubernetes environment with Windows nodes is impacted. Run kubectl get nodes -l kubernetes.io/os=windows to see if any Windows nodes are in use.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", ], known_not_affected: [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-3955", }, { category: "external", summary: "RHBZ#2227128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227128", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-3955", url: "https://www.cve.org/CVERecord?id=CVE-2023-3955", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-3955", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3955", }, ], release_date: "2023-08-23T13:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-08-29T09:24:51+00:00", details: "For Windows Machine Config Operator upgrades, see the following documentation: \nhttps://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", product_ids: [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:4835", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", }, ], }
RHSA-2023:4835
Vulnerability from csaf_redhat
Published
2023-08-29 09:24
Modified
2024-11-22 22:16
Summary
Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 5.1.2 security update
Notes
Topic
The components for Red Hat OpenShift support for Windows Containers 5.1.2 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift support for Windows Containers allows you to deploy Windows container workloads running on Windows Server containers.
Security Fix(es):
* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3676)
* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3955)
For more details about the security issue(s), including the impact, CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "The components for Red Hat OpenShift support for Windows Containers 5.1.2 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Red Hat OpenShift support for Windows Containers allows you to deploy Windows container workloads running on Windows Server containers.\n\nSecurity Fix(es):\n\n* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3676)\n\n* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3955)\n\nFor more details about the security issue(s), including the impact, CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2023:4835", url: "https://access.redhat.com/errata/RHSA-2023:4835", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "2227126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227126", }, { category: "external", summary: "2227128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227128", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_4835.json", }, ], title: "Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 5.1.2 security update", tracking: { current_release_date: "2024-11-22T22:16:28+00:00", generator: { date: "2024-11-22T22:16:28+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2023:4835", initial_release_date: "2023-08-29T09:24:51+00:00", revision_history: [ { date: "2023-08-29T09:24:51+00:00", number: "1", summary: "Initial version", }, { date: "2023-08-29T09:24:51+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T22:16:28+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat OpenShift Container Platform 4.10", product: { name: "Red Hat OpenShift Container Platform 4.10", product_id: "8Base-RHOSE-4.10", product_identification_helper: { cpe: "cpe:/a:redhat:openshift:4.10::el8", }, }, }, ], category: "product_family", name: "Red Hat OpenShift Enterprise", }, { branches: [ { category: "product_version", name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba_amd64", product: { name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba_amd64", product_id: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba?arch=amd64&repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-operator-bundle&tag=v5.1.2-2", }, }, }, { category: "product_version", name: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", product: { name: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", product_id: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e?arch=amd64&repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-rhel8-operator&tag=5.1.2-3", }, }, }, ], category: "architecture", name: "amd64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba_amd64 as a component of Red Hat OpenShift Container Platform 4.10", product_id: "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba_amd64", }, product_reference: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba_amd64", relates_to_product_reference: "8Base-RHOSE-4.10", }, { category: "default_component_of", full_product_name: { name: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64 as a component of Red Hat OpenShift Container Platform 4.10", product_id: "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", }, product_reference: "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", relates_to_product_reference: "8Base-RHOSE-4.10", }, ], }, vulnerabilities: [ { cve: "CVE-2023-3676", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, discovery_date: "2023-07-28T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba_amd64", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2227126", }, ], notes: [ { category: "description", text: "A vulnerability was found in Kubernetes. This flaw allows a user who can create pods on Windows nodes to escalate to admin privileges on those nodes.", title: "Vulnerability description", }, { category: "summary", text: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", title: "Vulnerability summary", }, { category: "other", text: "Kubernetes clusters are only affected if they include Windows nodes. Any Kubernetes environment with Windows nodes is impacted. Run kubectl get nodes -l kubernetes.io/os=windows to see if any Windows nodes are in use.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", ], known_not_affected: [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-3676", }, { category: "external", summary: "RHBZ#2227126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227126", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-3676", url: "https://www.cve.org/CVERecord?id=CVE-2023-3676", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-3676", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3676", }, ], release_date: "2023-08-23T13:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-08-29T09:24:51+00:00", details: "For Windows Machine Config Operator upgrades, see the following documentation: \nhttps://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", product_ids: [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:4835", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", }, { cve: "CVE-2023-3955", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, discovery_date: "2023-07-28T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba_amd64", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2227128", }, ], notes: [ { category: "description", text: "A vulnerability was found in Kubernetes. This flaw allows a user who can create pods on Windows nodes to escalate to admin privileges on those nodes.", title: "Vulnerability description", }, { category: "summary", text: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", title: "Vulnerability summary", }, { category: "other", text: "Kubernetes clusters are only affected if they include Windows nodes. Any Kubernetes environment with Windows nodes is impacted. Run kubectl get nodes -l kubernetes.io/os=windows to see if any Windows nodes are in use.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", ], known_not_affected: [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:4181beeb40fe7610006bfb4ed4f867db2754ac1c9356f422012db89833cb73ba_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-3955", }, { category: "external", summary: "RHBZ#2227128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227128", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-3955", url: "https://www.cve.org/CVERecord?id=CVE-2023-3955", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-3955", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3955", }, ], release_date: "2023-08-23T13:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-08-29T09:24:51+00:00", details: "For Windows Machine Config Operator upgrades, see the following documentation: \nhttps://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", product_ids: [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:4835", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:f843bc7006b479794fa7fedd7361a65c19aaf3b6ca0e3feb67ac9edf41ab446e_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", }, ], }
RHSA-2023:4885
Vulnerability from csaf_redhat
Published
2023-08-30 16:33
Modified
2024-11-22 22:16
Summary
Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 8.0.2 security update
Notes
Topic
The components for Red Hat OpenShift support for Windows Containers 8.0.2 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift support for Windows Containers allows you to deploy Windows container workloads running on Windows Server containers.
Security Fix(es):
* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3676)
* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3955)
For more details about the security issue(s), including the impact, CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "The components for Red Hat OpenShift support for Windows Containers 8.0.2 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Red Hat OpenShift support for Windows Containers allows you to deploy Windows container workloads running on Windows Server containers.\n\nSecurity Fix(es):\n\n* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3676)\n\n* kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation (CVE-2023-3955)\n\nFor more details about the security issue(s), including the impact, CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2023:4885", url: "https://access.redhat.com/errata/RHSA-2023:4885", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "2227126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227126", }, { category: "external", summary: "2227128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227128", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_4885.json", }, ], title: "Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 8.0.2 security update", tracking: { current_release_date: "2024-11-22T22:16:36+00:00", generator: { date: "2024-11-22T22:16:36+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2023:4885", initial_release_date: "2023-08-30T16:33:47+00:00", revision_history: [ { date: "2023-08-30T16:33:47+00:00", number: "1", summary: "Initial version", }, { date: "2023-08-30T16:33:47+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T22:16:36+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat OpenShift Container Platform 4.13", product: { name: "Red Hat OpenShift Container Platform 4.13", product_id: "9Base-RHOSE-4.13", product_identification_helper: { cpe: "cpe:/a:redhat:openshift:4.13::el9", }, }, }, ], category: "product_family", name: "Red Hat OpenShift Enterprise", }, { branches: [ { category: "product_version", name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62_amd64", product: { name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62_amd64", product_id: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62?arch=amd64&repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-operator-bundle&tag=v8.0.2-9", }, }, }, { category: "product_version", name: "openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", product: { name: "openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", product_id: "openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", product_identification_helper: { purl: "pkg:oci/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e?arch=amd64&repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-rhel9-operator&tag=8.0.2-9", }, }, }, ], category: "architecture", name: "amd64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62_amd64 as a component of Red Hat OpenShift Container Platform 4.13", product_id: "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62_amd64", }, product_reference: "openshift4-wincw/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62_amd64", relates_to_product_reference: "9Base-RHOSE-4.13", }, { category: "default_component_of", full_product_name: { name: "openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64 as a component of Red Hat OpenShift Container Platform 4.13", product_id: "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", }, product_reference: "openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", relates_to_product_reference: "9Base-RHOSE-4.13", }, ], }, vulnerabilities: [ { cve: "CVE-2023-3676", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, discovery_date: "2023-07-28T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62_amd64", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2227126", }, ], notes: [ { category: "description", text: "A vulnerability was found in Kubernetes. This flaw allows a user who can create pods on Windows nodes to escalate to admin privileges on those nodes.", title: "Vulnerability description", }, { category: "summary", text: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", title: "Vulnerability summary", }, { category: "other", text: "Kubernetes clusters are only affected if they include Windows nodes. Any Kubernetes environment with Windows nodes is impacted. Run kubectl get nodes -l kubernetes.io/os=windows to see if any Windows nodes are in use.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", ], known_not_affected: [ "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-3676", }, { category: "external", summary: "RHBZ#2227126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227126", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-3676", url: "https://www.cve.org/CVERecord?id=CVE-2023-3676", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-3676", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3676", }, ], release_date: "2023-08-23T13:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-08-30T16:33:47+00:00", details: "For Windows Machine Config Operator upgrades, see the following documentation:\nhttps://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", product_ids: [ "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:4885", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", }, { cve: "CVE-2023-3955", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, discovery_date: "2023-07-28T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62_amd64", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2227128", }, ], notes: [ { category: "description", text: "A vulnerability was found in Kubernetes. This flaw allows a user who can create pods on Windows nodes to escalate to admin privileges on those nodes.", title: "Vulnerability description", }, { category: "summary", text: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", title: "Vulnerability summary", }, { category: "other", text: "Kubernetes clusters are only affected if they include Windows nodes. Any Kubernetes environment with Windows nodes is impacted. Run kubectl get nodes -l kubernetes.io/os=windows to see if any Windows nodes are in use.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", ], known_not_affected: [ "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-operator-bundle@sha256:406e16a97699ffcfe37d9343c1008ad385f76566c07104b3500b01923e7b2e62_amd64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-3955", }, { category: "external", summary: "RHBZ#2227128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2227128", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-3955", url: "https://www.cve.org/CVERecord?id=CVE-2023-3955", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-3955", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3955", }, ], release_date: "2023-08-23T13:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2023-08-30T16:33:47+00:00", details: "For Windows Machine Config Operator upgrades, see the following documentation:\nhttps://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", product_ids: [ "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2023:4885", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "9Base-RHOSE-4.13:openshift4-wincw/windows-machine-config-rhel9-operator@sha256:d62c040e75416b749852184604f7475976e57b2b6f1b6c37a40f38ab74d4888e_amd64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation", }, ], }
opensuse-su-2024:14599-1
Vulnerability from csaf_opensuse
Published
2024-12-18 00:00
Modified
2024-12-18 00:00
Summary
govulncheck-vulndb-0.0.20241213T205935-1.1 on GA media
Notes
Title of the patch
govulncheck-vulndb-0.0.20241213T205935-1.1 on GA media
Description of the patch
These are all security issues fixed in the govulncheck-vulndb-0.0.20241213T205935-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-14599
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "govulncheck-vulndb-0.0.20241213T205935-1.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the govulncheck-vulndb-0.0.20241213T205935-1.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-14599", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14599-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2024:14599-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QTUY324RV3FFZBHVIWDHRCIOPJHIJIN4/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2024:14599-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QTUY324RV3FFZBHVIWDHRCIOPJHIJIN4/", }, { category: "self", summary: "SUSE CVE CVE-2020-10696 page", url: "https://www.suse.com/security/cve/CVE-2020-10696/", }, { category: "self", summary: "SUSE CVE CVE-2020-8912 page", url: "https://www.suse.com/security/cve/CVE-2020-8912/", }, { category: "self", summary: "SUSE CVE CVE-2022-31668 page", url: "https://www.suse.com/security/cve/CVE-2022-31668/", }, { category: "self", summary: "SUSE CVE CVE-2023-26248 page", url: "https://www.suse.com/security/cve/CVE-2023-26248/", }, { category: "self", summary: "SUSE CVE CVE-2023-3676 page", url: "https://www.suse.com/security/cve/CVE-2023-3676/", }, { category: "self", summary: "SUSE CVE CVE-2023-3955 page", url: "https://www.suse.com/security/cve/CVE-2023-3955/", }, { category: "self", summary: "SUSE CVE CVE-2024-12401 page", url: "https://www.suse.com/security/cve/CVE-2024-12401/", }, { category: "self", summary: "SUSE CVE CVE-2024-37032 page", url: "https://www.suse.com/security/cve/CVE-2024-37032/", }, { category: "self", summary: "SUSE CVE CVE-2024-44337 page", url: "https://www.suse.com/security/cve/CVE-2024-44337/", }, { category: "self", summary: "SUSE CVE CVE-2024-45039 page", url: "https://www.suse.com/security/cve/CVE-2024-45039/", }, { category: "self", summary: "SUSE CVE CVE-2024-45337 page", url: "https://www.suse.com/security/cve/CVE-2024-45337/", }, { category: "self", summary: "SUSE CVE CVE-2024-45436 page", url: "https://www.suse.com/security/cve/CVE-2024-45436/", }, { category: "self", summary: "SUSE CVE CVE-2024-46455 page", url: "https://www.suse.com/security/cve/CVE-2024-46455/", }, { category: "self", summary: "SUSE CVE CVE-2024-46528 page", url: "https://www.suse.com/security/cve/CVE-2024-46528/", }, { category: "self", summary: "SUSE CVE CVE-2024-53257 page", url: "https://www.suse.com/security/cve/CVE-2024-53257/", }, { category: "self", summary: "SUSE CVE CVE-2024-53859 page", url: "https://www.suse.com/security/cve/CVE-2024-53859/", }, { category: "self", summary: "SUSE CVE CVE-2024-55601 page", url: "https://www.suse.com/security/cve/CVE-2024-55601/", }, { category: "self", summary: "SUSE CVE CVE-2024-55657 page", url: "https://www.suse.com/security/cve/CVE-2024-55657/", }, { category: "self", summary: "SUSE CVE CVE-2024-55658 page", url: "https://www.suse.com/security/cve/CVE-2024-55658/", }, { category: "self", summary: "SUSE CVE CVE-2024-55659 page", url: "https://www.suse.com/security/cve/CVE-2024-55659/", }, { category: "self", summary: "SUSE CVE CVE-2024-55660 page", url: "https://www.suse.com/security/cve/CVE-2024-55660/", }, ], title: "govulncheck-vulndb-0.0.20241213T205935-1.1 on GA media", tracking: { current_release_date: "2024-12-18T00:00:00Z", generator: { date: "2024-12-18T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:14599-1", initial_release_date: "2024-12-18T00:00:00Z", revision_history: [ { date: "2024-12-18T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", product: { name: "govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", product_id: "govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", product: { name: "govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", product_id: "govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", product: { name: "govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", product_id: "govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", product: { name: "govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", product_id: "govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", }, product_reference: "govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", }, product_reference: "govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "govulncheck-vulndb-0.0.20241213T205935-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", }, product_reference: "govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", }, product_reference: "govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2020-10696", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-10696", }, ], notes: [ { category: "general", text: "A path traversal flaw was found in Buildah in versions before 1.14.5. This flaw allows an attacker to trick a user into building a malicious container image hosted on an HTTP(s) server and then write files to the user's system anywhere that the user has permissions.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-10696", url: "https://www.suse.com/security/cve/CVE-2020-10696", }, { category: "external", summary: "SUSE Bug 1167864 for CVE-2020-10696", url: "https://bugzilla.suse.com/1167864", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "important", }, ], title: "CVE-2020-10696", }, { cve: "CVE-2020-8912", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-8912", }, ], notes: [ { category: "general", text: "A vulnerability in the in-band key negotiation exists in the AWS S3 Crypto SDK for GoLang versions prior to V2. An attacker with write access to the targeted bucket can change the encryption algorithm of an object in the bucket, which can then allow them to change AES-GCM to AES-CTR. Using this in combination with a decryption oracle can reveal the authentication key used by AES-GCM as decrypting the GMAC tag leaves the authentication key recoverable as an algebraic equation. It is recommended to update your SDK to V2 or later, and re-encrypt your files.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-8912", url: "https://www.suse.com/security/cve/CVE-2020-8912", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "low", }, ], title: "CVE-2020-8912", }, { cve: "CVE-2022-31668", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-31668", }, ], notes: [ { category: "general", text: "Harbor fails to validate the user permissions when updating p2p preheat policies. By sending a request to update a p2p preheat policy with an id that belongs to a project that the currently authenticated user doesn't have access to, the attacker could modify p2p preheat policies configured in other projects.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-31668", url: "https://www.suse.com/security/cve/CVE-2022-31668", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "important", }, ], title: "CVE-2022-31668", }, { cve: "CVE-2023-26248", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-26248", }, ], notes: [ { category: "general", text: "The Kademlia DHT (go-libp2p-kad-dht 0.20.0 and earlier) used in IPFS (0.18.1 and earlier) assigns routing information for content (i.e., information about who holds the content) to be stored by peers whose peer IDs have a small DHT distance from the content ID. This allows an attacker to censor content by generating many Sybil peers whose peer IDs have a small distance from the content ID, thus hijacking the content resolution process.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-26248", url: "https://www.suse.com/security/cve/CVE-2023-26248", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-26248", }, { cve: "CVE-2023-3676", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3676", }, ], notes: [ { category: "general", text: "A security issue was discovered in Kubernetes where a user\n that can create pods on Windows nodes may be able to escalate to admin \nprivileges on those nodes. Kubernetes clusters are only affected if they\n include Windows nodes.\n", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3676", url: "https://www.suse.com/security/cve/CVE-2023-3676", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "important", }, ], title: "CVE-2023-3676", }, { cve: "CVE-2023-3955", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3955", }, ], notes: [ { category: "general", text: "A security issue was discovered in Kubernetes where a user\n that can create pods on Windows nodes may be able to escalate to admin \nprivileges on those nodes. Kubernetes clusters are only affected if they\n include Windows nodes.\n", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3955", url: "https://www.suse.com/security/cve/CVE-2023-3955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "important", }, ], title: "CVE-2023-3955", }, { cve: "CVE-2024-12401", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-12401", }, ], notes: [ { category: "general", text: "A flaw was found in the cert-manager package. This flaw allows an attacker who can modify PEM data that the cert-manager reads, for example, in a Secret resource, to use large amounts of CPU in the cert-manager controller pod to effectively create a denial-of-service (DoS) vector for the cert-manager in the cluster.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-12401", url: "https://www.suse.com/security/cve/CVE-2024-12401", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "moderate", }, ], title: "CVE-2024-12401", }, { cve: "CVE-2024-37032", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-37032", }, ], notes: [ { category: "general", text: "Ollama before 0.1.34 does not validate the format of the digest (sha256 with 64 hex digits) when getting the model path, and thus mishandles the TestGetBlobsPath test cases such as fewer than 64 hex digits, more than 64 hex digits, or an initial ../ substring.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-37032", url: "https://www.suse.com/security/cve/CVE-2024-37032", }, { category: "external", summary: "SUSE Bug 1225724 for CVE-2024-37032", url: "https://bugzilla.suse.com/1225724", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "important", }, ], title: "CVE-2024-37032", }, { cve: "CVE-2024-44337", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-44337", }, ], notes: [ { category: "general", text: "The package `github.com/gomarkdown/markdown` is a Go library for parsing Markdown text and rendering as HTML. Prior to pseudoversion `v0.0.0-20240729232818-a2a9c4f`, which corresponds with commit `a2a9c4f76ef5a5c32108e36f7c47f8d310322252`, there was a logical problem in the paragraph function of the parser/block.go file, which allowed a remote attacker to cause a denial of service (DoS) condition by providing a tailor-made input that caused an infinite loop, causing the program to hang and consume resources indefinitely. Submit `a2a9c4f76ef5a5c32108e36f7c47f8d310322252` contains fixes to this problem.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-44337", url: "https://www.suse.com/security/cve/CVE-2024-44337", }, { category: "external", summary: "SUSE Bug 1231713 for CVE-2024-44337", url: "https://bugzilla.suse.com/1231713", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "moderate", }, ], title: "CVE-2024-44337", }, { cve: "CVE-2024-45039", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-45039", }, ], notes: [ { category: "general", text: "gnark is a fast zk-SNARK library that offers a high-level API to design circuits. Versions prior to 0.11.0 have a soundness issue - in case of multiple commitments used inside the circuit the prover is able to choose all but the last commitment. As gnark uses the commitments for optimized non-native multiplication, lookup checks etc. as random challenges, then it could impact the soundness of the whole circuit. However, using multiple commitments has been discouraged due to the additional cost to the verifier and it has not been supported in the recursive in-circuit Groth16 verifier and Solidity verifier. gnark's maintainers expect the impact of the issue be very small - only for the users who have implemented the native Groth16 verifier or are using it with multiple commitments. We do not have information of such users. The issue has been patched in version 0.11.0. As a workaround, users should follow gnark maintainers' recommendation to use only a single commitment and then derive in-circuit commitments as needed using the `std/multicommit` package.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-45039", url: "https://www.suse.com/security/cve/CVE-2024-45039", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "moderate", }, ], title: "CVE-2024-45039", }, { cve: "CVE-2024-45337", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-45337", }, ], notes: [ { category: "general", text: "Applications and libraries which misuse connection.serverAuthenticate (via callback field ServerConfig.PublicKeyCallback) may be susceptible to an authorization bypass. The documentation for ServerConfig.PublicKeyCallback says that \"A call to this function does not guarantee that the key offered is in fact used to authenticate.\" Specifically, the SSH protocol allows clients to inquire about whether a public key is acceptable before proving control of the corresponding private key. PublicKeyCallback may be called with multiple keys, and the order in which the keys were provided cannot be used to infer which key the client successfully authenticated with, if any. Some applications, which store the key(s) passed to PublicKeyCallback (or derived information) and make security relevant determinations based on it once the connection is established, may make incorrect assumptions. For example, an attacker may send public keys A and B, and then authenticate with A. PublicKeyCallback would be called only twice, first with A and then with B. A vulnerable application may then make authorization decisions based on key B for which the attacker does not actually control the private key. Since this API is widely misused, as a partial mitigation golang.org/x/cry...@v0.31.0 enforces the property that, when successfully authenticating via public key, the last key passed to ServerConfig.PublicKeyCallback will be the key used to authenticate the connection. PublicKeyCallback will now be called multiple times with the same key, if necessary. Note that the client may still not control the last key passed to PublicKeyCallback if the connection is then authenticated with a different method, such as PasswordCallback, KeyboardInteractiveCallback, or NoClientAuth. Users should be using the Extensions field of the Permissions return value from the various authentication callbacks to record data associated with the authentication attempt instead of referencing external state. Once the connection is established the state corresponding to the successful authentication attempt can be retrieved via the ServerConn.Permissions field. Note that some third-party libraries misuse the Permissions type by sharing it across authentication attempts; users of third-party libraries should refer to the relevant projects for guidance.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-45337", url: "https://www.suse.com/security/cve/CVE-2024-45337", }, { category: "external", summary: "SUSE Bug 1234482 for CVE-2024-45337", url: "https://bugzilla.suse.com/1234482", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "important", }, ], title: "CVE-2024-45337", }, { cve: "CVE-2024-45436", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-45436", }, ], notes: [ { category: "general", text: "extractFromZipFile in model.go in Ollama before 0.1.47 can extract members of a ZIP archive outside of the parent directory.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-45436", url: "https://www.suse.com/security/cve/CVE-2024-45436", }, { category: "external", summary: "SUSE Bug 1229895 for CVE-2024-45436", url: "https://bugzilla.suse.com/1229895", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "important", }, ], title: "CVE-2024-45436", }, { cve: "CVE-2024-46455", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-46455", }, ], notes: [ { category: "general", text: "unstructured v.0.14.2 and before is vulnerable to XML External Entity (XXE) via the XMLParser.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-46455", url: "https://www.suse.com/security/cve/CVE-2024-46455", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "critical", }, ], title: "CVE-2024-46455", }, { cve: "CVE-2024-46528", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-46528", }, ], notes: [ { category: "general", text: "An Insecure Direct Object Reference (IDOR) vulnerability in KubeSphere 4.x before 4.1.3 and 3.x through 3.4.1 and KubeSphere Enterprise 4.x before 4.1.3 and 3.x through 3.5.0 allows low-privileged authenticated attackers to access sensitive resources without proper authorization checks.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-46528", url: "https://www.suse.com/security/cve/CVE-2024-46528", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "moderate", }, ], title: "CVE-2024-46528", }, { cve: "CVE-2024-53257", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53257", }, ], notes: [ { category: "general", text: "Vitess is a database clustering system for horizontal scaling of MySQL. The /debug/querylogz and /debug/env pages for vtgate and vttablet do not properly escape user input. The result is that queries executed by Vitess can write HTML into the monitoring page at will. These pages are rendered using text/template instead of rendering with a proper HTML templating engine. This vulnerability is fixed in 21.0.1, 20.0.4, and 19.0.8.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-53257", url: "https://www.suse.com/security/cve/CVE-2024-53257", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "moderate", }, ], title: "CVE-2024-53257", }, { cve: "CVE-2024-53859", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53859", }, ], notes: [ { category: "general", text: "go-gh is a Go module for interacting with the `gh` utility and the GitHub API from the command line. A security vulnerability has been identified in `go-gh` that could leak authentication tokens intended for GitHub hosts to non-GitHub hosts when within a codespace. `go-gh` sources authentication tokens from different environment variables depending on the host involved: 1. `GITHUB_TOKEN`, `GH_TOKEN` for GitHub.com and ghe.com and 2. `GITHUB_ENTERPRISE_TOKEN`, `GH_ENTERPRISE_TOKEN` for GitHub Enterprise Server. Prior to version `2.11.1`, `auth.TokenForHost` could source a token from the `GITHUB_TOKEN` environment variable for a host other than GitHub.com or ghe.com when within a codespace. In version `2.11.1`, `auth.TokenForHost` will only source a token from the `GITHUB_TOKEN` environment variable for GitHub.com or ghe.com hosts. Successful exploitation could send authentication token to an unintended host. This issue has been addressed in version 2.11.1 and all users are advised to upgrade. Users are also advised to regenerate authentication tokens and to review their personal security log and any relevant audit logs for actions associated with their account or enterprise.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-53859", url: "https://www.suse.com/security/cve/CVE-2024-53859", }, { category: "external", summary: "SUSE Bug 1233976 for CVE-2024-53859", url: "https://bugzilla.suse.com/1233976", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "moderate", }, ], title: "CVE-2024-53859", }, { cve: "CVE-2024-55601", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-55601", }, ], notes: [ { category: "general", text: "Hugo is a static site generator. Starting in version 0.123.0 and prior to version 0.139.4, some HTML attributes in Markdown in the internal templates listed below not escaped in internal render hooks. Those whoa re impacted are Hugo users who do not trust their Markdown content files and are using one or more of these templates: `_default/_markup/render-link.html` from `v0.123.0`; `_default/_markup/render-image.html` from `v0.123.0`; `_default/_markup/render-table.html` from `v0.134.0`; and/or `shortcodes/youtube.html` from `v0.125.0`. This issue is patched in v0.139.4. As a workaround, one may replace an affected component with user defined templates or disable the internal templates.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-55601", url: "https://www.suse.com/security/cve/CVE-2024-55601", }, { category: "external", summary: "SUSE Bug 1234340 for CVE-2024-55601", url: "https://bugzilla.suse.com/1234340", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "moderate", }, ], title: "CVE-2024-55601", }, { cve: "CVE-2024-55657", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-55657", }, ], notes: [ { category: "general", text: "SiYuan is a personal knowledge management system. Prior to version 3.1.16, an arbitrary file read vulnerability exists in Siyuan's `/api/template/render` endpoint. The absence of proper validation on the path parameter allows attackers to access sensitive files on the host system. Version 3.1.16 contains a patch for the issue.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-55657", url: "https://www.suse.com/security/cve/CVE-2024-55657", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "important", }, ], title: "CVE-2024-55657", }, { cve: "CVE-2024-55658", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-55658", }, ], notes: [ { category: "general", text: "SiYuan is a personal knowledge management system. Prior to version 3.1.16, SiYuan's /api/export/exportResources endpoint is vulnerable to arbitary file read via path traversal. It is possible to manipulate the paths parameter to access and download arbitrary files from the host system by traversing the workspace directory structure. Version 3.1.16 contains a patch for the issue.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-55658", url: "https://www.suse.com/security/cve/CVE-2024-55658", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "important", }, ], title: "CVE-2024-55658", }, { cve: "CVE-2024-55659", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-55659", }, ], notes: [ { category: "general", text: "SiYuan is a personal knowledge management system. Prior to version 3.1.16, the `/api/asset/upload` endpoint in Siyuan is vulnerable to both arbitrary file write to the host and stored cross-site scripting (via the file write). Version 3.1.16 contains a patch for the issue.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-55659", url: "https://www.suse.com/security/cve/CVE-2024-55659", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "important", }, ], title: "CVE-2024-55659", }, { cve: "CVE-2024-55660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-55660", }, ], notes: [ { category: "general", text: "SiYuan is a personal knowledge management system. Prior to version 3.1.16, SiYuan's `/api/template/renderSprig` endpoint is vulnerable to Server-Side Template Injection (SSTI) through the Sprig template engine. Although the engine has limitations, it allows attackers to access environment variables. Version 3.1.16 contains a patch for the issue.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-55660", url: "https://www.suse.com/security/cve/CVE-2024-55660", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20241213T205935-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-12-18T00:00:00Z", details: "moderate", }, ], title: "CVE-2024-55660", }, ], }
gsd-2023-3955
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
A security issue was discovered in Kubernetes where a user
that can create pods on Windows nodes may be able to escalate to admin
privileges on those nodes. Kubernetes clusters are only affected if they
include Windows nodes.
Aliases
Aliases
{ GSD: { alias: "CVE-2023-3955", id: "GSD-2023-3955", }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2023-3955", ], details: "A security issue was discovered in Kubernetes where a user\n that can create pods on Windows nodes may be able to escalate to admin \nprivileges on those nodes. Kubernetes clusters are only affected if they\n include Windows nodes.\n", id: "GSD-2023-3955", modified: "2023-12-13T01:20:54.978434Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "security@kubernetes.io", ID: "CVE-2023-3955", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "kubelet", version: { version_data: [ { version_value: "not down converted", x_cve_json_5_version_data: { defaultStatus: "unaffected", versions: [ { status: "affected", version: "v1.28.0", }, { lessThanOrEqual: "v1.27.4", status: "affected", version: "v1.27.0", versionType: "semver", }, { lessThanOrEqual: "v1.26.7", status: "affected", version: "v1.26.0", versionType: "semver", }, { lessThanOrEqual: "v1.25.12", status: "affected", version: "v1.25.0", versionType: "semver", }, { status: "unaffected", version: "v1.28.1", }, { status: "unaffected", version: "v1.27.5", }, { status: "unaffected", version: "v1.26.8", }, { status: "unaffected", version: "v1.25.13", }, { status: "unaffected", version: "v1.24.17", }, { lessThanOrEqual: "v1.24.16", status: "affected", version: "0", versionType: "semver", }, ], }, }, ], }, }, ], }, vendor_name: "Kubernetes", }, ], }, }, credits: [ { lang: "en", value: "James Sturtevant", }, { lang: "en", value: "Mark Rossetti", }, ], data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A security issue was discovered in Kubernetes where a user\n that can create pods on Windows nodes may be able to escalate to admin \nprivileges on those nodes. Kubernetes clusters are only affected if they\n include Windows nodes.\n", }, ], }, generator: { engine: "Vulnogram 0.1.0-dev", }, impact: { cvss: [ { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, ], }, problemtype: { problemtype_data: [ { description: [ { cweId: "CWE-20", lang: "eng", value: "CWE-20 Improper Input Validation", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/kubernetes/kubernetes/issues/119595", refsource: "MISC", url: "https://github.com/kubernetes/kubernetes/issues/119595", }, { name: "https://groups.google.com/g/kubernetes-security-announce/c/JrX4bb7d83E", refsource: "MISC", url: "https://groups.google.com/g/kubernetes-security-announce/c/JrX4bb7d83E", }, { name: "https://security.netapp.com/advisory/ntap-20231221-0002/", refsource: "MISC", url: "https://security.netapp.com/advisory/ntap-20231221-0002/", }, ], }, source: { discovery: "INTERNAL", }, }, "nvd.nist.gov": { cve: { configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", matchCriteriaId: "FF4C81ED-BB69-490B-BABA-89C2501A5E6D", versionEndExcluding: "1.24.17", vulnerable: true, }, { criteria: "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", matchCriteriaId: "86AE4580-37A1-4E7B-9B7A-A30316676065", versionEndExcluding: "1.25.13", versionStartIncluding: "1.25.0", vulnerable: true, }, { criteria: "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", matchCriteriaId: "99BCE3D9-3EFA-4358-B36E-47954DBE28D4", versionEndExcluding: "1.26.8", versionStartIncluding: "1.26.0", vulnerable: true, }, { criteria: "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", matchCriteriaId: "3F30AD24-3FA9-4FA8-BCD5-5351EA357B49", versionEndExcluding: "1.27.5", versionStartIncluding: "1.27.0", vulnerable: true, }, { criteria: "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", matchCriteriaId: "A3FAE518-D5F9-4A7D-A703-1D36EA8A563C", versionEndExcluding: "1.28.1", versionStartIncluding: "1.28.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], descriptions: [ { lang: "en", value: "A security issue was discovered in Kubernetes where a user\n that can create pods on Windows nodes may be able to escalate to admin \nprivileges on those nodes. Kubernetes clusters are only affected if they\n include Windows nodes.\n", }, { lang: "es", value: "Se descubrió un problema de seguridad en Kubernetes donde un usuario que puede crear pods en nodos de Windows puede escalar a privilegios de administrador en esos nodos. Los clústeres de Kubernetes solo se ven afectados si incluyen nodos de Windows.", }, ], id: "CVE-2023-3955", lastModified: "2023-12-21T22:15:14.280", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "jordan@liggitt.net", type: "Secondary", }, ], }, published: "2023-10-31T21:15:08.613", references: [ { source: "jordan@liggitt.net", tags: [ "Exploit", "Mitigation", "Patch", "Third Party Advisory", ], url: "https://github.com/kubernetes/kubernetes/issues/119595", }, { source: "jordan@liggitt.net", tags: [ "Technical Description", ], url: "https://groups.google.com/g/kubernetes-security-announce/c/JrX4bb7d83E", }, { source: "jordan@liggitt.net", url: "https://security.netapp.com/advisory/ntap-20231221-0002/", }, ], sourceIdentifier: "jordan@liggitt.net", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-20", }, ], source: "jordan@liggitt.net", type: "Secondary", }, ], }, }, }, }
fkie_cve-2023-3955
Vulnerability from fkie_nvd
Published
2023-10-31 21:15
Modified
2025-02-13 17:17
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A security issue was discovered in Kubernetes where a user
that can create pods on Windows nodes may be able to escalate to admin
privileges on those nodes. Kubernetes clusters are only affected if they
include Windows nodes.
References
▼ | URL | Tags | |
---|---|---|---|
jordan@liggitt.net | https://github.com/kubernetes/kubernetes/issues/119595 | Exploit, Mitigation, Patch, Third Party Advisory | |
jordan@liggitt.net | https://groups.google.com/g/kubernetes-security-announce/c/JrX4bb7d83E | Technical Description | |
jordan@liggitt.net | https://security.netapp.com/advisory/ntap-20231221-0002/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/kubernetes/kubernetes/issues/119595 | Exploit, Mitigation, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/g/kubernetes-security-announce/c/JrX4bb7d83E | Technical Description | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20231221-0002/ |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
kubernetes | kubernetes | * | |
kubernetes | kubernetes | * | |
kubernetes | kubernetes | * | |
kubernetes | kubernetes | * | |
kubernetes | kubernetes | * | |
microsoft | windows | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", matchCriteriaId: "FF4C81ED-BB69-490B-BABA-89C2501A5E6D", versionEndExcluding: "1.24.17", vulnerable: true, }, { criteria: "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", matchCriteriaId: "86AE4580-37A1-4E7B-9B7A-A30316676065", versionEndExcluding: "1.25.13", versionStartIncluding: "1.25.0", vulnerable: true, }, { criteria: "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", matchCriteriaId: "99BCE3D9-3EFA-4358-B36E-47954DBE28D4", versionEndExcluding: "1.26.8", versionStartIncluding: "1.26.0", vulnerable: true, }, { criteria: "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", matchCriteriaId: "3F30AD24-3FA9-4FA8-BCD5-5351EA357B49", versionEndExcluding: "1.27.5", versionStartIncluding: "1.27.0", vulnerable: true, }, { criteria: "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", matchCriteriaId: "A3FAE518-D5F9-4A7D-A703-1D36EA8A563C", versionEndExcluding: "1.28.1", versionStartIncluding: "1.28.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A security issue was discovered in Kubernetes where a user\n that can create pods on Windows nodes may be able to escalate to admin \nprivileges on those nodes. Kubernetes clusters are only affected if they\n include Windows nodes.", }, { lang: "es", value: "Se descubrió un problema de seguridad en Kubernetes donde un usuario que puede crear pods en nodos de Windows puede escalar a privilegios de administrador en esos nodos. Los clústeres de Kubernetes solo se ven afectados si incluyen nodos de Windows.", }, ], id: "CVE-2023-3955", lastModified: "2025-02-13T17:17:00.000", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "jordan@liggitt.net", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-10-31T21:15:08.613", references: [ { source: "jordan@liggitt.net", tags: [ "Exploit", "Mitigation", "Patch", "Third Party Advisory", ], url: "https://github.com/kubernetes/kubernetes/issues/119595", }, { source: "jordan@liggitt.net", tags: [ "Technical Description", ], url: "https://groups.google.com/g/kubernetes-security-announce/c/JrX4bb7d83E", }, { source: "jordan@liggitt.net", url: "https://security.netapp.com/advisory/ntap-20231221-0002/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Mitigation", "Patch", "Third Party Advisory", ], url: "https://github.com/kubernetes/kubernetes/issues/119595", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Technical Description", ], url: "https://groups.google.com/g/kubernetes-security-announce/c/JrX4bb7d83E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.netapp.com/advisory/ntap-20231221-0002/", }, ], sourceIdentifier: "jordan@liggitt.net", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "jordan@liggitt.net", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
ghsa-q78c-gwqw-jcmc
Vulnerability from github
Published
2023-10-31 21:32
Modified
2025-02-13 19:20
Severity ?
Summary
Kubernetes privilege escalation vulnerability
Details
A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes.
{ affected: [ { package: { ecosystem: "Go", name: "k8s.io/kubernetes", }, ranges: [ { events: [ { introduced: "1.28.0", }, { fixed: "1.28.1", }, ], type: "ECOSYSTEM", }, ], versions: [ "1.28.0", ], }, { package: { ecosystem: "Go", name: "k8s.io/kubernetes", }, ranges: [ { events: [ { introduced: "1.27.0", }, { fixed: "1.27.5", }, ], type: "ECOSYSTEM", }, ], }, { package: { ecosystem: "Go", name: "k8s.io/kubernetes", }, ranges: [ { events: [ { introduced: "1.26.0", }, { fixed: "1.26.8", }, ], type: "ECOSYSTEM", }, ], }, { package: { ecosystem: "Go", name: "k8s.io/kubernetes", }, ranges: [ { events: [ { introduced: "1.25.0", }, { fixed: "1.25.13", }, ], type: "ECOSYSTEM", }, ], }, { package: { ecosystem: "Go", name: "k8s.io/kubernetes", }, ranges: [ { events: [ { introduced: "0", }, { fixed: "1.24.17", }, ], type: "ECOSYSTEM", }, ], }, ], aliases: [ "CVE-2023-3955", ], database_specific: { cwe_ids: [ "CWE-20", ], github_reviewed: true, github_reviewed_at: "2023-11-01T17:16:38Z", nvd_published_at: "2023-10-31T21:15:08Z", severity: "HIGH", }, details: "A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes.", id: "GHSA-q78c-gwqw-jcmc", modified: "2025-02-13T19:20:56Z", published: "2023-10-31T21:32:35Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-3955", }, { type: "WEB", url: "https://github.com/kubernetes/kubernetes/issues/119595", }, { type: "WEB", url: "https://github.com/kubernetes/kubernetes/pull/120128", }, { type: "WEB", url: "https://github.com/kubernetes/kubernetes/pull/120134", }, { type: "WEB", url: "https://github.com/kubernetes/kubernetes/pull/120135", }, { type: "WEB", url: "https://github.com/kubernetes/kubernetes/pull/120136", }, { type: "WEB", url: "https://github.com/kubernetes/kubernetes/pull/120137", }, { type: "WEB", url: "https://github.com/kubernetes/kubernetes/pull/120138", }, { type: "WEB", url: "https://github.com/kubernetes/kubernetes/commit/38c97fa67ed35f36e730856728c9e3807f63546a", }, { type: "WEB", url: "https://github.com/kubernetes/kubernetes/commit/50334505cd27cbe7cf71865388f25a00e29b2596", }, { type: "WEB", url: "https://github.com/kubernetes/kubernetes/commit/7da6d72c05dffb3b87e62e2bc8c3228ea12ba1b9", }, { type: "WEB", url: "https://github.com/kubernetes/kubernetes/commit/b7547e28f898af37aa2f1107a49111f963250fe6", }, { type: "WEB", url: "https://github.com/kubernetes/kubernetes/commit/c4e17abb04728e3a3f9bb26e727b0f978df20ec9", }, { type: "PACKAGE", url: "https://github.com/kubernetes/kubernetes", }, { type: "WEB", url: "https://groups.google.com/g/kubernetes-security-announce/c/JrX4bb7d83E", }, { type: "WEB", url: "https://security.netapp.com/advisory/ntap-20231221-0002", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], summary: "Kubernetes privilege escalation vulnerability", }
wid-sec-w-2023-2163
Vulnerability from csaf_certbund
Published
2023-08-23 22:00
Modified
2023-11-27 23:00
Summary
Kubernetes: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Kubernetes ist ein Werkzeug zur Automatisierung der Bereitstellung, Skalierung und Verwaltung von containerisierten Anwendungen.
Angriff
Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Kubernetes ausnutzen, um seine Privilegien zu erhöhen.
Betroffene Betriebssysteme
- UNIX
- Linux
- Sonstiges
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Kubernetes ist ein Werkzeug zur Automatisierung der Bereitstellung, Skalierung und Verwaltung von containerisierten Anwendungen.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Kubernetes ausnutzen, um seine Privilegien zu erhöhen.", title: "Angriff", }, { category: "general", text: "- UNIX\n- Linux\n- Sonstiges", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-2163 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2163.json", }, { category: "self", summary: "WID-SEC-2023-2163 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2163", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2023:7515 vom 2023-11-27", url: "https://access.redhat.com/errata/RHSA-2023:7515", }, { category: "external", summary: "akamai-security-research/PoCs vom 2023-09-14", url: "https://github.com/akamai/akamai-security-research/tree/main/PoCs/CVE-2023-3676", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2023:4885 vom 2023-08-31", url: "https://access.redhat.com/errata/RHSA-2023:4885", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2023:4835 vom 2023-08-29", url: "https://access.redhat.com/errata/RHSA-2023:4835", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2023:4777 vom 2023-08-28", url: "https://access.redhat.com/errata/RHSA-2023:4777", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2023:4780 vom 2023-08-28", url: "https://access.redhat.com/errata/RHSA-2023:4780", }, { category: "external", summary: "Fedora Security Advisory FEDORA-2023-8F8DDB2428 vom 2023-08-24", url: "https://bodhi.fedoraproject.org/updates/FEDORA-2023-8f8ddb2428", }, { category: "external", summary: "Fedora Security Advisory FEDORA-2023-A3FCC0751F vom 2023-08-24", url: "https://bodhi.fedoraproject.org/updates/FEDORA-2023-a3fcc0751f", }, { category: "external", summary: "GitHub Issue Kubernetes 119595 vom 2023-08-23", url: "https://github.com/kubernetes/kubernetes/issues/119595", }, { category: "external", summary: "GitHub Issue Kubernetes 119594 vom 2023-08-23", url: "https://github.com/kubernetes/kubernetes/issues/119594", }, { category: "external", summary: "GitHub Issue Kubernetes 119339 vom 2023-08-23", url: "https://github.com/kubernetes/kubernetes/issues/119339", }, ], source_lang: "en-US", title: "Kubernetes: Mehrere Schwachstellen", tracking: { current_release_date: "2023-11-27T23:00:00.000+00:00", generator: { date: "2024-08-15T17:57:36.721+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-2163", initial_release_date: "2023-08-23T22:00:00.000+00:00", revision_history: [ { date: "2023-08-23T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2023-08-24T22:00:00.000+00:00", number: "2", summary: "Neue Updates von Fedora aufgenommen", }, { date: "2023-08-28T22:00:00.000+00:00", number: "3", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2023-08-29T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2023-08-30T22:00:00.000+00:00", number: "5", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2023-09-14T22:00:00.000+00:00", number: "6", summary: "PoC aufgenommen", }, { date: "2023-11-27T23:00:00.000+00:00", number: "7", summary: "Neue Updates von Red Hat aufgenommen", }, ], status: "final", version: "7", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Fedora Linux", product: { name: "Fedora Linux", product_id: "74185", product_identification_helper: { cpe: "cpe:/o:fedoraproject:fedora:-", }, }, }, ], category: "vendor", name: "Fedora", }, { branches: [ { branches: [ { category: "product_name", name: "Open Source Kubernetes < 1.28.1", product: { name: "Open Source Kubernetes < 1.28.1", product_id: "T029521", product_identification_helper: { cpe: "cpe:/a:kubernetes:kubernetes:1.28.1", }, }, }, { category: "product_name", name: "Open Source Kubernetes < 1.27.5", product: { name: "Open Source Kubernetes < 1.27.5", product_id: "T029522", product_identification_helper: { cpe: "cpe:/a:kubernetes:kubernetes:1.27.5", }, }, }, { category: "product_name", name: "Open Source Kubernetes < 1.26.8", product: { name: "Open Source Kubernetes < 1.26.8", product_id: "T029523", product_identification_helper: { cpe: "cpe:/a:kubernetes:kubernetes:1.26.8", }, }, }, { category: "product_name", name: "Open Source Kubernetes < 1.25.13", product: { name: "Open Source Kubernetes < 1.25.13", product_id: "T029524", product_identification_helper: { cpe: "cpe:/a:kubernetes:kubernetes:1.25.13", }, }, }, { category: "product_name", name: "Open Source Kubernetes < 1.24.17", product: { name: "Open Source Kubernetes < 1.24.17", product_id: "T029525", product_identification_helper: { cpe: "cpe:/a:kubernetes:kubernetes:1.24.17", }, }, }, { category: "product_name", name: "Open Source Kubernetes < 2.0.0-alpha.1", product: { name: "Open Source Kubernetes < 2.0.0-alpha.1", product_id: "T029528", product_identification_helper: { cpe: "cpe:/a:kubernetes:kubernetes:2.0.0-alpha.1:csi-proxy", }, }, }, { category: "product_name", name: "Open Source Kubernetes < 1.1.3", product: { name: "Open Source Kubernetes < 1.1.3", product_id: "T029529", product_identification_helper: { cpe: "cpe:/a:kubernetes:kubernetes:1.1.3:csi-proxy", }, }, }, ], category: "product_name", name: "Kubernetes", }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, { branches: [ { category: "product_name", name: "Red Hat OpenShift", product: { name: "Red Hat OpenShift", product_id: "367115", product_identification_helper: { cpe: "cpe:/a:redhat:openshift:-", }, }, }, { category: "product_name", name: "Red Hat OpenShift Container Platform 4.11", product: { name: "Red Hat OpenShift Container Platform 4.11", product_id: "T025990", product_identification_helper: { cpe: "cpe:/a:redhat:openshift:container_platform_4.11", }, }, }, { category: "product_name", name: "Red Hat OpenShift Container Platform 4.12", product: { name: "Red Hat OpenShift Container Platform 4.12", product_id: "T026435", product_identification_helper: { cpe: "cpe:/a:redhat:openshift:container_platform_4.12", }, }, }, ], category: "product_name", name: "OpenShift", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2023-3955", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Kubernetes. Dieser Fehler besteht aufgrund einer unzureichenden Eingabenbereinigung auf Windows-Knoten. Ein Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern.", }, ], product_status: { known_affected: [ "67646", "367115", "T026435", "T025990", "74185", ], }, release_date: "2023-08-23T22:00:00.000+00:00", title: "CVE-2023-3955", }, { cve: "CVE-2023-3893", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Kubernetes. Dieser Fehler besteht aufgrund einer unzureichenden Eingabenbereinigung auf kubernetes-csi-proxy. Ein Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern.", }, ], product_status: { known_affected: [ "67646", "367115", "T026435", "T025990", "74185", ], }, release_date: "2023-08-23T22:00:00.000+00:00", title: "CVE-2023-3893", }, { cve: "CVE-2023-3676", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Kubernetes. Dieser Fehler besteht aufgrund einer unzureichenden Eingabenbereinigung auf Windows-Knoten. Ein Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern.", }, ], product_status: { known_affected: [ "67646", "367115", "T026435", "T025990", "74185", ], }, release_date: "2023-08-23T22:00:00.000+00:00", title: "CVE-2023-3676", }, ], }
WID-SEC-W-2023-2163
Vulnerability from csaf_certbund
Published
2023-08-23 22:00
Modified
2023-11-27 23:00
Summary
Kubernetes: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Kubernetes ist ein Werkzeug zur Automatisierung der Bereitstellung, Skalierung und Verwaltung von containerisierten Anwendungen.
Angriff
Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Kubernetes ausnutzen, um seine Privilegien zu erhöhen.
Betroffene Betriebssysteme
- UNIX
- Linux
- Sonstiges
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Kubernetes ist ein Werkzeug zur Automatisierung der Bereitstellung, Skalierung und Verwaltung von containerisierten Anwendungen.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Kubernetes ausnutzen, um seine Privilegien zu erhöhen.", title: "Angriff", }, { category: "general", text: "- UNIX\n- Linux\n- Sonstiges", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-2163 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2163.json", }, { category: "self", summary: "WID-SEC-2023-2163 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2163", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2023:7515 vom 2023-11-27", url: "https://access.redhat.com/errata/RHSA-2023:7515", }, { category: "external", summary: "akamai-security-research/PoCs vom 2023-09-14", url: "https://github.com/akamai/akamai-security-research/tree/main/PoCs/CVE-2023-3676", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2023:4885 vom 2023-08-31", url: "https://access.redhat.com/errata/RHSA-2023:4885", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2023:4835 vom 2023-08-29", url: "https://access.redhat.com/errata/RHSA-2023:4835", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2023:4777 vom 2023-08-28", url: "https://access.redhat.com/errata/RHSA-2023:4777", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2023:4780 vom 2023-08-28", url: "https://access.redhat.com/errata/RHSA-2023:4780", }, { category: "external", summary: "Fedora Security Advisory FEDORA-2023-8F8DDB2428 vom 2023-08-24", url: "https://bodhi.fedoraproject.org/updates/FEDORA-2023-8f8ddb2428", }, { category: "external", summary: "Fedora Security Advisory FEDORA-2023-A3FCC0751F vom 2023-08-24", url: "https://bodhi.fedoraproject.org/updates/FEDORA-2023-a3fcc0751f", }, { category: "external", summary: "GitHub Issue Kubernetes 119595 vom 2023-08-23", url: "https://github.com/kubernetes/kubernetes/issues/119595", }, { category: "external", summary: "GitHub Issue Kubernetes 119594 vom 2023-08-23", url: "https://github.com/kubernetes/kubernetes/issues/119594", }, { category: "external", summary: "GitHub Issue Kubernetes 119339 vom 2023-08-23", url: "https://github.com/kubernetes/kubernetes/issues/119339", }, ], source_lang: "en-US", title: "Kubernetes: Mehrere Schwachstellen", tracking: { current_release_date: "2023-11-27T23:00:00.000+00:00", generator: { date: "2024-08-15T17:57:36.721+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-2163", initial_release_date: "2023-08-23T22:00:00.000+00:00", revision_history: [ { date: "2023-08-23T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2023-08-24T22:00:00.000+00:00", number: "2", summary: "Neue Updates von Fedora aufgenommen", }, { date: "2023-08-28T22:00:00.000+00:00", number: "3", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2023-08-29T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2023-08-30T22:00:00.000+00:00", number: "5", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2023-09-14T22:00:00.000+00:00", number: "6", summary: "PoC aufgenommen", }, { date: "2023-11-27T23:00:00.000+00:00", number: "7", summary: "Neue Updates von Red Hat aufgenommen", }, ], status: "final", version: "7", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Fedora Linux", product: { name: "Fedora Linux", product_id: "74185", product_identification_helper: { cpe: "cpe:/o:fedoraproject:fedora:-", }, }, }, ], category: "vendor", name: "Fedora", }, { branches: [ { branches: [ { category: "product_name", name: "Open Source Kubernetes < 1.28.1", product: { name: "Open Source Kubernetes < 1.28.1", product_id: "T029521", product_identification_helper: { cpe: "cpe:/a:kubernetes:kubernetes:1.28.1", }, }, }, { category: "product_name", name: "Open Source Kubernetes < 1.27.5", product: { name: "Open Source Kubernetes < 1.27.5", product_id: "T029522", product_identification_helper: { cpe: "cpe:/a:kubernetes:kubernetes:1.27.5", }, }, }, { category: "product_name", name: "Open Source Kubernetes < 1.26.8", product: { name: "Open Source Kubernetes < 1.26.8", product_id: "T029523", product_identification_helper: { cpe: "cpe:/a:kubernetes:kubernetes:1.26.8", }, }, }, { category: "product_name", name: "Open Source Kubernetes < 1.25.13", product: { name: "Open Source Kubernetes < 1.25.13", product_id: "T029524", product_identification_helper: { cpe: "cpe:/a:kubernetes:kubernetes:1.25.13", }, }, }, { category: "product_name", name: "Open Source Kubernetes < 1.24.17", product: { name: "Open Source Kubernetes < 1.24.17", product_id: "T029525", product_identification_helper: { cpe: "cpe:/a:kubernetes:kubernetes:1.24.17", }, }, }, { category: "product_name", name: "Open Source Kubernetes < 2.0.0-alpha.1", product: { name: "Open Source Kubernetes < 2.0.0-alpha.1", product_id: "T029528", product_identification_helper: { cpe: "cpe:/a:kubernetes:kubernetes:2.0.0-alpha.1:csi-proxy", }, }, }, { category: "product_name", name: "Open Source Kubernetes < 1.1.3", product: { name: "Open Source Kubernetes < 1.1.3", product_id: "T029529", product_identification_helper: { cpe: "cpe:/a:kubernetes:kubernetes:1.1.3:csi-proxy", }, }, }, ], category: "product_name", name: "Kubernetes", }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, { branches: [ { category: "product_name", name: "Red Hat OpenShift", product: { name: "Red Hat OpenShift", product_id: "367115", product_identification_helper: { cpe: "cpe:/a:redhat:openshift:-", }, }, }, { category: "product_name", name: "Red Hat OpenShift Container Platform 4.11", product: { name: "Red Hat OpenShift Container Platform 4.11", product_id: "T025990", product_identification_helper: { cpe: "cpe:/a:redhat:openshift:container_platform_4.11", }, }, }, { category: "product_name", name: "Red Hat OpenShift Container Platform 4.12", product: { name: "Red Hat OpenShift Container Platform 4.12", product_id: "T026435", product_identification_helper: { cpe: "cpe:/a:redhat:openshift:container_platform_4.12", }, }, }, ], category: "product_name", name: "OpenShift", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2023-3955", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Kubernetes. Dieser Fehler besteht aufgrund einer unzureichenden Eingabenbereinigung auf Windows-Knoten. Ein Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern.", }, ], product_status: { known_affected: [ "67646", "367115", "T026435", "T025990", "74185", ], }, release_date: "2023-08-23T22:00:00.000+00:00", title: "CVE-2023-3955", }, { cve: "CVE-2023-3893", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Kubernetes. Dieser Fehler besteht aufgrund einer unzureichenden Eingabenbereinigung auf kubernetes-csi-proxy. Ein Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern.", }, ], product_status: { known_affected: [ "67646", "367115", "T026435", "T025990", "74185", ], }, release_date: "2023-08-23T22:00:00.000+00:00", title: "CVE-2023-3893", }, { cve: "CVE-2023-3676", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Kubernetes. Dieser Fehler besteht aufgrund einer unzureichenden Eingabenbereinigung auf Windows-Knoten. Ein Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern.", }, ], product_status: { known_affected: [ "67646", "367115", "T026435", "T025990", "74185", ], }, release_date: "2023-08-23T22:00:00.000+00:00", title: "CVE-2023-3676", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.