CVE-2023-27496 Affecting olcne-kubevirt-chart package, versions <0:1.6.1-9.el8
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ORACLE8-OLCNEKUBEVIRTCHART-6593758
- published 10 Apr 2024
- disclosed 4 Apr 2023
Introduced: 4 Apr 2023
CVE-2023-27496 Open this link in a new tabHow to fix?
Upgrade Oracle:8
olcne-kubevirt-chart
to version 0:1.6.1-9.el8 or higher.
This issue was patched in ELSA-2023-23648
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream olcne-kubevirt-chart
package and not the olcne-kubevirt-chart
package as distributed by Oracle
.
See How to fix?
for Oracle:8
relevant fixed versions and status.
Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, the OAuth filter assumes that a state
query param is present on any response that looks like an OAuth redirect response. Sending it a request with the URI path equivalent to the redirect path, without the state
parameter, will lead to abnormal termination of Envoy process. Versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9 contain a patch. The issue can also be mitigated by locking down OAuth traffic, disabling the filter, or by filtering traffic before it reaches the OAuth filter (e.g. via a lua script).
References
- https://linux.oracle.com/cve/CVE-2023-27496.html
- https://linux.oracle.com/errata/ELSA-2023-12354.html
- https://linux.oracle.com/errata/ELSA-2023-12355.html
- https://linux.oracle.com/errata/ELSA-2023-12356.html
- https://linux.oracle.com/errata/ELSA-2023-12357.html
- https://linux.oracle.com/errata/ELSA-2023-23649.html
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-j79q-2g66-2xv5