ALT-PU-2020-2338-1
Package kubernetes updated to version 1.18.5-alt1 for branch p9 in task 254411.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-11252
The Kubernetes kube-controller-manager in versions v1.0-v1.17 is vulnerable to a credential leakage via error messages in mount failure logs and events for AzureFile and CephFS volumes.
Modified: 2024-11-21
CVE-2019-11254
The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.
- https://github.com/kubernetes/kubernetes/issues/89535
- https://github.com/kubernetes/kubernetes/issues/89535
- https://groups.google.com/d/msg/kubernetes-announce/ALL9s73E5ck/4yHe8J-PBAAJ
- https://groups.google.com/d/msg/kubernetes-announce/ALL9s73E5ck/4yHe8J-PBAAJ
- https://security.netapp.com/advisory/ntap-20200413-0003/
- https://security.netapp.com/advisory/ntap-20200413-0003/
Modified: 2024-11-21
CVE-2020-8551
The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on port 10250.
- https://github.com/kubernetes/kubernetes/issues/89377
- https://github.com/kubernetes/kubernetes/issues/89377
- https://groups.google.com/forum/#%21topic/kubernetes-security-announce/2UOlsba2g0s
- https://groups.google.com/forum/#%21topic/kubernetes-security-announce/2UOlsba2g0s
- FEDORA-2020-aeea04cd13
- FEDORA-2020-aeea04cd13
- https://security.netapp.com/advisory/ntap-20200413-0003/
- https://security.netapp.com/advisory/ntap-20200413-0003/
Modified: 2024-11-21
CVE-2020-8552
The Kubernetes API server component in versions prior to 1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via successful API requests.
- https://github.com/kubernetes/kubernetes/issues/89378
- https://github.com/kubernetes/kubernetes/issues/89378
- https://groups.google.com/forum/#%21topic/kubernetes-security-announce/2UOlsba2g0s
- https://groups.google.com/forum/#%21topic/kubernetes-security-announce/2UOlsba2g0s
- FEDORA-2020-aeea04cd13
- FEDORA-2020-aeea04cd13
- https://security.netapp.com/advisory/ntap-20200413-0003/
- https://security.netapp.com/advisory/ntap-20200413-0003/
Modified: 2024-11-21
CVE-2020-8555
The Kubernetes kube-controller-manager in versions v1.0-1.14, versions prior to v1.15.12, v1.16.9, v1.17.5, and version v1.18.0 are vulnerable to a Server Side Request Forgery (SSRF) that allows certain authorized users to leak up to 500 bytes of arbitrary information from unprotected endpoints within the master's host network (such as link-local or loopback services).
- [oss-security] 20200601 CVE-2020-8555: Kubernetes: Half-Blind SSRF in kube-controller-manager
- [oss-security] 20200601 CVE-2020-8555: Kubernetes: Half-Blind SSRF in kube-controller-manager
- [oss-security] 20210504 [kubernetes] CVE-2020-8562: Bypass of Kubernetes API Server proxy TOCTOU
- [oss-security] 20210504 [kubernetes] CVE-2020-8562: Bypass of Kubernetes API Server proxy TOCTOU
- https://github.com/kubernetes/kubernetes/issues/91542
- https://github.com/kubernetes/kubernetes/issues/91542
- https://groups.google.com/d/topic/kubernetes-security-announce/kEK27tqqs30/discussion
- https://groups.google.com/d/topic/kubernetes-security-announce/kEK27tqqs30/discussion
- FEDORA-2020-aeea04cd13
- FEDORA-2020-aeea04cd13
- https://security.netapp.com/advisory/ntap-20200724-0005/
- https://security.netapp.com/advisory/ntap-20200724-0005/
Modified: 2024-11-21
CVE-2020-8558
The Kubelet and kube-proxy components in versions 1.1.0-1.16.10, 1.17.0-1.17.6, and 1.18.0-1.18.3 were found to contain a security issue which allows adjacent hosts to reach TCP and UDP services bound to 127.0.0.1 running on the node or in the node's network namespace. Such a service is generally thought to be reachable only by other processes on the same host, but due to this defeect, could be reachable by other hosts on the same LAN as the node, or by containers running on the same node as the service.
- https://github.com/kubernetes/kubernetes/issues/92315
- https://github.com/kubernetes/kubernetes/issues/92315
- [Security Advisory] CVE-2020-8558: Kubernetes: Node setting allows for neighboring hosts to bypass localhost boundary
- [Security Advisory] CVE-2020-8558: Kubernetes: Node setting allows for neighboring hosts to bypass localhost boundary
- https://security.netapp.com/advisory/ntap-20200821-0001/
- https://security.netapp.com/advisory/ntap-20200821-0001/
Modified: 2024-11-21
CVE-2021-25743
kubectl does not neutralize escape, meta or control sequences contained in the raw data it outputs to a terminal. This includes but is not limited to the unstructured string fields in objects such as Events.