SB2022030135 - Multiple vulnerabilities in OpenShift API for Data Protection (OADP) 1.0



SB2022030135 - Multiple vulnerabilities in OpenShift API for Data Protection (OADP) 1.0

Published: March 1, 2022

Security Bulletin ID SB2022030135
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 75% Low 25%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Type Confusion (CVE-ID: CVE-2021-41190)

The vulnerability allows a remote attacker to compromise the system.

The vulnerability exists due to a type confusion error. A remote authenticated attacker can pass specially crafted data to the application, trigger a type confusion error and interpret the resulting content differently.


2) Infinite loop (CVE-ID: CVE-2021-29482)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due the function readUvarint used to read the xz container format may not terminate a loop providing malicious input. A remote attacker can consume all available system resources and cause denial of service conditions.


3) Improper Verification of Cryptographic Signature (CVE-ID: CVE-2021-3521)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to an error in RPM's signature functionality, as RPM does not check the binding signature of subkeys before importing them. A remote attacker with ability to add malicious subkey to a legitimate public key can run malicious code on the system.



4) Insufficient verification of data authenticity (CVE-ID: CVE-2021-4122)

The vulnerability allows a local attacker to escalate privileges on the system.

The vulnerability exists due to improper handling of the LUKS2 reencryption recover. A local attacker with physical access to the medium can send a specially crafted LUKS header and trick cryptsetup into disabling encryption during the recovery of the device.

Remediation

Install update from vendor's website.