-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
(experimental vulnerability issue) CVE-2024-2961 #699
Comments
The security status of the Red Hat images can be seen in the Red Hat Ecosystem Catalog, e.g. for the Red Hat Universal Base Image 9 Minimal. At the time of writing, the Red Hat Universal Base Image 9 Minimal "does not contain known unapplied security advisories". However, the vulnerability scanners find a lot of open CVEs, e.g. CVE-2024-2961. According to the table in the Affected Packages and Issued Red Hat Security Errata section, Red Hat Enterprise Linux 9 is affected by this CVE. But it is fixed for Red Hat Enterprise Linux 8, see RHSA-2024:2722 - Security Advisory. Either the security status in the Red Hat Ecosystem Catalog or the table on the CVE page must be wrong. The description in NVD - CVE-2024-2961 states:
Therefore, a system is affected if
RHSA-2024:2722 lists the package
Kafka in the SDP 24.3.0 contains the affected version:
The latest UBI8 image contains the patched version:
The latest UBI9 image contains another version which is older than version 2.39 and where the patch status is unknown:
So, the Kafka image and the UBI9 image would be affected if the plugin is enabled, but it is disabled:
It seems that this CVE has no effect on the UBI 8 and 9 images. However, Red Hat created a ticket and fixed this issue for glibc-2.28 used by UBI8. The question is, if they also applied this patch to glibc-2.34 which is used for UBI9. It happens often that security advisories can be found for older versions but it is not clear if the issue is still fixed in a newer version. The source RPMs can be downloaded from
The RPM package for glibc-2.28 contains the fix for the CVE-2024-2961 in the file
On the one hand, Red Hat did not port this patch to the newer glibc version, even if the CVE correctly states that other versions below 2.39 are affected. On the other hand, the CVE has no effect because the ISO-2022-CN-EXT plugin is not enabled. A deeper look at the RPM spec shows that only the basic plugins (also called modules), like UTF-8, are installed with the glibc package and that the other plugins are outsourced to the glibc-gconv-extra package:
In summary this means, that CVE-2024-2961 was fixed in UBI8 and appears again in UBI9. The Stackable images are not affected as long as glibc-gconv-extra is not installed. AssessmentsIn general: The vulnerability was found in multiple docker.stackable.tech/stackable/krb5:1.18.2-stackable24.3.0@glibc-gconv-extra:2.28-236.el8_9.12
glibc-common:2.28-236.el8_9.13
all other images and packages from 24.3.0 and 0.0.0-dev
|
View observations in SecObserve
Review assessments in SecObserve
The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.
The text was updated successfully, but these errors were encountered: