CVE-2024-5651

NameCVE-2024-5651
DescriptionA flaw was found in the Fence Agents Remediation operator. This vulnerability can allow a Remote Code Execution (RCE) primitive by supplying an arbitrary command to execute in the --ssh-path/--telnet-path arguments. A low-privilege user, for example, a user with developer access, can create a specially crafted FenceAgentsRemediation for a fence agent supportingĀ  --ssh-path/--telnet-path arguments to execute arbitrary commands on the operator's pod. This RCE leads to a privilege escalation, first as the service account running the operator, then to another service account with cluster-admin privileges.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
fence-agents (PTS)jessie3.1.5-2vulnerable
stretch4.0.25-1+deb9u2fixed
buster4.3.3-2+deb10u1vulnerable
bullseye4.7.1-1fixed
bookworm4.12.1-1fixed
sid, trixie4.15.0-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
fence-agentssourcejessie(unfixed)end-of-life
fence-agentssourcebuster(unfixed)end-of-life
fence-agentssource(unstable)(not affected)

Notes

- fence-agents <not-affected> (Vulnerability specific to Fence Agents Remediation operator in Red Hat, cf #1078970)
https://bugzilla.redhat.com/show_bug.cgi?id=2290540
[stretch] - fence-agents <postponed> (Minor issue)

Search for package or bug name: Reporting problems