U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2023-0296

Change History

CVE Modified by Red Hat, Inc. 2/02/2023 4:22:48 PM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
Red Hat, Inc. AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Removed CWE
Red Hat, Inc. CWE-327

								
						
Changed Description
The Birthday attack against 64-bit block ciphers flaw (CVE-2016-2183) was reported for the health checks port (9979) on etcd grpc-proxy component. Even though the CVE-2016-2183 has been fixed in the etcd components, to enable periodic health checks from kubelet, it was necessary to open up a new port (9979) on etcd grpc-proxy, hence this port might be considered as still vulnerable to the same type of vulnerability. The health checks on etcd grpc-proxy do not contain sensitive data (only metrics data), therefore the potential impact related to this vulnerability is minimal. The CVE-2023-0296 has been assigned to this issue to track the permanent fix in the etcd component.
The Birthday attack against 64-bit block ciphers (CVE-2016-2183) was reported for the health checks port (9979) on the etcd grpc-proxy component. Even though the CVE-2016-2183 has been fixed in the etcd components, to enable periodic health checks from kubelet, it was necessary to open up a new port (9979) on etcd grpc-proxy. Therefore, this port might still be considered vulnerable to the same type of attack. The health checks on etcd grpc-proxy do not contain sensitive data, only metrics data. The potential impact related to this vulnerability is minimal. The CVE-2023-0296 has been assigned to this issue to track the permanent fix in the etcd component.
Added Reference

								
							
							
						
https://access.redhat.com/errata/RHSA-2022:7399 [No Types Assigned]
Added Reference

								
							
							
						
https://access.redhat.com/errata/RHSA-2023:0069 [No Types Assigned]
Added Reference

								
							
							
						
https://access.redhat.com/errata/RHSA-2023:0241 [No Types Assigned]
Added Reference

								
							
							
						
https://access.redhat.com/security/cve/CVE-2023-0296 [No Types Assigned]