Directory Traversal Affecting olcne-agent package, versions <0:1.5.8-4.el7
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ORACLE7-OLCNEAGENT-3151017
- published 1 Dec 2022
- disclosed 1 Mar 2023
How to fix?
Upgrade Oracle:7 olcne-agent to version 0:1.5.8-4.el7 or higher.
This issue was patched in ELSA-2022-10035.
NVD Description
Note: Versions mentioned in the description apply only to the upstream olcne-agent package and not the olcne-agent package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
Users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group without authorization. Clusters are impacted by this vulnerability if all of the following are true: 1. There are 2+ CustomResourceDefinitions sharing the same API group 2. Users have cluster-wide list or watch authorization on one of those custom resources. 3. The same users are not authorized to read another custom resource in the same API group.
References
- https://linux.oracle.com/cve/CVE-2022-3162.html
- https://linux.oracle.com/errata/ELSA-2022-10033.html
- https://linux.oracle.com/errata/ELSA-2022-10034.html
- https://linux.oracle.com/errata/ELSA-2022-10035.html
- https://linux.oracle.com/errata/ELSA-2022-10036.html
- https://github.com/kubernetes/kubernetes/issues/113756
- https://groups.google.com/g/kubernetes-security-announce/c/iUd550j7kjA
- https://security.netapp.com/advisory/ntap-20230511-0004/