First published: Wed Feb 21 2024(Updated: )
A flaw was found in the kubevirt-csi component of OpenShift Virtualization's Hosted Control Plane (HCP). This issue could allow an authenticated attacker to gain access to the root HCP worker node's volume by creating a custom Persistent Volume that matches the name of a worker node.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Virtualization | ||
Red Hat OpenShift Container Platform | =4.13 | |
Red Hat OpenShift Container Platform | =4.14 | |
Red Hat OpenShift Container Platform | =4.15 | |
Red Hat OpenShift Container Platform | =4.13 | |
Red Hat OpenShift Container Platform | =4.14 | |
Red Hat OpenShift Container Platform | =4.15 | |
Red Hat OpenShift Container Platform | =4.13 | |
Red Hat OpenShift Container Platform | =4.14 | |
Red Hat OpenShift Container Platform | =4.15 | |
Red Hat OpenShift Container Platform | =4.13 | |
Red Hat OpenShift Container Platform | =4.14 | |
Red Hat OpenShift Container Platform | =4.15 | |
Red Hat OpenShift Container Platform for Power | =4.13 | |
Red Hat OpenShift Container Platform for Power | =4.14 | |
Red Hat OpenShift Container Platform for Power | =4.15 | |
go/github.com/kubevirt/csi-driver | <0.0.0-202403081943-cc28dcbb0afc14 | 0.0.0-202403081943-cc28dcbb0afc14 |
=4.13 | ||
=4.14 | ||
=4.15 | ||
=4.13 | ||
=4.14 | ||
=4.15 | ||
=4.13 | ||
=4.14 | ||
=4.15 | ||
=4.13 | ||
=4.14 | ||
=4.15 | ||
=4.13 | ||
=4.14 | ||
=4.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1725 has been classified as a critical severity vulnerability.
To fix CVE-2024-1725, update the kubevirt-csi component of Red Hat OpenShift Virtualization to a version that includes the security patch.
CVE-2024-1725 can potentially allow authenticated attackers to access the root HCP worker node's volume.
CVE-2024-1725 affects users of Red Hat OpenShift Virtualization utilizing the kubevirt-csi component.
CVE-2024-1725 is not a remote attack vulnerability, as it requires authenticated access to exploit.