CVE-2024-45615
Mar, 03/09/2024 – 22:15
CVE-2024-45615
CVE-2024-45615
Mar, 03/09/2024 – 22:15
CVE-2024-45615
CVE-2024-44809
Mar, 03/09/2024 – 22:15
CVE-2024-44809
CVE-2024-45620
Mar, 03/09/2024 – 22:15
CVE-2024-45620
CVE-2024-45619
Mar, 03/09/2024 – 22:15
CVE-2024-45619
CVE-2024-45618
Mar, 03/09/2024 – 22:15
CVE-2024-45618
CVE-2024-45617
Mar, 03/09/2024 – 22:15
CVE-2024-45617
CVE-2024-43803
Mar, 03/09/2024 – 19:15
CVE-2024-43803
BMO will only read a key with the name `value` (or `userData`, `metaData`, or `networkData`), so that limits the exposure somewhat. `value` is probably a pretty common key though. Secrets used by _other_ `BareMetalHost`s in different namespaces are always vulnerable. It is probably relatively unusual for anyone other than cluster administrators to have RBAC access to create/edit a `BareMetalHost`. This vulnerability is only meaningful, if the cluster has users other than administrators and users' privileges are limited to their respective namespaces.
The patch prevents BMO from accepting links to Secrets from other namespaces as BMH input. Any BMH configuration is only read from the same namespace only. The problem is patched in BMO releases v0.7.0, v0.6.2 and v0.5.2 and users should upgrade to those versions. Prior upgrading, duplicate the BMC Secrets to the namespace where the corresponding BMH is. After upgrade, remove the old Secrets. As a workaround, an operator can configure BMO RBAC to be namespace scoped for Secrets, instead of cluster scoped, to prevent BMO from accessing Secrets from other namespaces.
CVE-2024-45310
Mar, 03/09/2024 – 19:15
CVE-2024-45310
Some workarounds are available. Using user namespaces restricts this attack fairly significantly such that the attacker can only create inodes in directories that the remapped root user/group has write access to. Unless the root user is remapped to an actual
user on the host (such as with rootless containers that don't use `/etc/sub[ug]id`), this in practice means that an attacker would only be able to create inodes in world-writable directories. A strict enough SELinux or AppArmor policy could in principle also restrict the scope if a specific label is applied to the runc runtime, though neither the extent to which the standard existing policies block this attack nor what exact policies are needed to sufficiently restrict this attack have been thoroughly tested.
CVE-2024-45307
Mar, 03/09/2024 – 19:15
CVE-2024-45307
CVE-2024-45678
Mar, 03/09/2024 – 20:15
CVE-2024-45678