SB2023082832 - Fedora 38 update for moby-engine
Published: August 28, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 9 secuirty vulnerabilities.
1) Missing Authorization (CVE-ID: CVE-2021-41803)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation when handling auto-config requests. A remote authenticated user can craft an auto-config request that allows the TLS certificate and ACL token to be generated for a node name not intended by the operator. This forces Consul to store unintended information, which can be repeatedly abused to cause an authenticated denial of service attack from a malicious operator.
2) Resource exhaustion (CVE-ID: CVE-2022-3064)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources when parsing large YAML documents. A remote attacker can consume excessive amounts of CPU or memory and perform a denial of service (DoS) attack.
3) Unchecked Return Value (CVE-ID: CVE-2022-40716)
The vulnerability allows a remote user to bypass implemented security restrictions.
The vulnerability exists due to an error when handling CSR requests at the RPC endpoint. A remote user with access to a client agent’s mTLS certificate and a valid ACL token for any service within the mesh can send a specially crafted certificate signing request (CSR) to the Consul’s internal RPC endpoint and bypass intended ACL token restrictions.
4) Input validation error (CVE-ID: CVE-2023-0845)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote user with service:write permissions can configure the upstreams to reference a peering destination and crash the Consul server or client agent hosting the xDS connection to an API gateway or ingress gateway.
5) Improper Privilege Management (CVE-ID: CVE-2023-25173)
The vulnerability allows a local user to escalate privileges.
The vulnerability exists due to improper privilege management where supplementary groups are not set up properly inside a container. A local user can use supplementary group access to bypass primary group restrictions and compromise the container.
6) Insufficiently protected credentials (CVE-ID: CVE-2023-26054)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to BuildKit may expose sensitive information when the user sends a build request that contains a Git URL with credentials and the build creates a provenance attestation describing that build. A remote attacker can gain access to sensitive information.
7) Unprotected Alternate Channel (CVE-ID: CVE-2023-28840)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to unprotected alternate channel within encrypted overlay networks. A remote attacker can inject arbitrary Ethernet frames into the encrypted overlay network and perform a denial of service (DoS) attack.
8) Missing Encryption of Sensitive Data (CVE-ID: CVE-2023-28841)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to missing encryption of sensitive data within the overlay network driver. A remote attacker can gain unauthorized access to sensitive information on the system.
9) Unprotected Alternate Channel (CVE-ID: CVE-2023-28842)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to unprotected alternate channel within encrypted overlay networks. A remote attacker can inject arbitrary Ethernet frames into the encrypted overlay network by encapsulating them in VXLAN datagrams.
Remediation
Install update from vendor's website.