Lucene search

K
redhatRedHatRHSA-2024:4520
HistoryJul 11, 2024 - 5:30 p.m.

(RHSA-2024:4520) Important: Migration Toolkit for Containers (MTC) 1.7.16 security and bug fix update

2024-07-1117:30:56
access.redhat.com
1
migration toolkit
container platform
kubernetes
security fix
bug fix
openshift
cve
web console
api
cpu exhaustion
http/2
persistent volume data
internal container images

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

AI Score

8.4

Confidence

High

EPSS

0.05

Percentile

93.0%

The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.

Security Fix(es) from Bugzilla:

  • webpack-dev-middleware: lack of URL validation may lead to file leak (CVE-2024-29180)

  • golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290)

  • golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm (CVE-2024-24783)

  • golang: net/mail: comments in display names are incorrectly handled (CVE-2024-24784)

  • golang: html/template: errors returned from MarshalJSON methods may break template escaping (CVE-2024-24785)

  • envoy: HTTP/2 CPU exhaustion due to CONTINUATION frame flood (CVE-2024-30255)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

AI Score

8.4

Confidence

High

EPSS

0.05

Percentile

93.0%