ALT-PU-2022-1245-1
Package kubernetes updated to version 1.22.5-alt2 for branch c9f2 in task 293762.
Closed vulnerabilities
BDU:2021-06196
Уязвимость программы для оркестровки контейнеризированных приложений Kubernetes, связанная с недостатками разграничения доступа, позволяющая нарушителю обойти введенные ограничения безопасности
BDU:2022-01684
Уязвимость компонента kube-apiserver программного средства управления кластерами виртуальных машин Kubernetes, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании
BDU:2022-02241
Уязвимость программного средства управления кластерами виртуальных машин Kubernetes, связанная с использованием открытой переадресации, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
Modified: 2024-11-21
CVE-2020-8562
As mitigations to a report from 2019 and CVE-2020-8555, Kubernetes attempts to prevent proxied connections from accessing link-local or localhost networks when making user-driven connections to Services, Pods, Nodes, or StorageClass service providers. As part of this mitigation Kubernetes does a DNS name resolution check and validates that response IPs are not in the link-local (169.254.0.0/16) or localhost (127.0.0.0/8) range. Kubernetes then performs a second DNS resolution without validation for the actual connection. If a non-standard DNS server returns different non-cached responses, a user may be able to bypass the proxy IP restriction and access private networks on the control plane.
- https://github.com/kubernetes/kubernetes/issues/101493
- https://github.com/kubernetes/kubernetes/issues/101493
- https://groups.google.com/g/kubernetes-security-announce/c/-MFX60_wdOY
- https://groups.google.com/g/kubernetes-security-announce/c/-MFX60_wdOY
- https://security.netapp.com/advisory/ntap-20220225-0002/
- https://security.netapp.com/advisory/ntap-20220225-0002/
Modified: 2024-11-21
CVE-2020-8563
In Kubernetes clusters using VSphere as a cloud provider, with a logging level set to 4 or above, VSphere cloud credentials will be leaked in the cloud controller manager's log. This affects < v1.19.3.
- https://github.com/kubernetes/kubernetes/issues/95621
- https://github.com/kubernetes/kubernetes/issues/95621
- Multiple secret leaks when verbose logging is enabled
- Multiple secret leaks when verbose logging is enabled
- https://security.netapp.com/advisory/ntap-20210122-0006/
- https://security.netapp.com/advisory/ntap-20210122-0006/
Modified: 2024-11-21
CVE-2020-8564
In Kubernetes clusters using a logging level of at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. This affects < v1.19.3, < v1.18.10, < v1.17.13.
- https://github.com/kubernetes/kubernetes/issues/95622
- https://github.com/kubernetes/kubernetes/issues/95622
- Multiple secret leaks when verbose logging is enabled
- Multiple secret leaks when verbose logging is enabled
- https://security.netapp.com/advisory/ntap-20210122-0006/
- https://security.netapp.com/advisory/ntap-20210122-0006/
Modified: 2024-11-21
CVE-2020-8565
In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl. This affects <= v1.19.3, <= v1.18.10, <= v1.17.13, < v1.20.0-alpha2.
Modified: 2024-11-21
CVE-2020-8566
In Kubernetes clusters using Ceph RBD as a storage provisioner, with logging level of at least 4, Ceph RBD admin secrets can be written to logs. This occurs in kube-controller-manager's logs during provisioning of Ceph RBD persistent claims. This affects < v1.19.3, < v1.18.10, < v1.17.13.
- https://github.com/kubernetes/kubernetes/issues/95624
- https://github.com/kubernetes/kubernetes/issues/95624
- Multiple secret leaks when verbose logging is enabled
- Multiple secret leaks when verbose logging is enabled
- https://security.netapp.com/advisory/ntap-20210122-0006/
- https://security.netapp.com/advisory/ntap-20210122-0006/
Modified: 2024-11-21
CVE-2021-25735
A security issue was discovered in kube-apiserver that could allow node updates to bypass a Validating Admission Webhook. Clusters are only affected by this vulnerability if they run a Validating Admission Webhook for Nodes that denies admission based at least partially on the old state of the Node object. Validating Admission Webhook does not observe some previous fields.
Modified: 2024-11-21
CVE-2021-25737
A security issue was discovered in Kubernetes where a user may be able to redirect pod traffic to private networks on a Node. Kubernetes already prevents creation of Endpoint IPs in the localhost or link-local range, but the same validation was not performed on EndpointSlice IPs.
- https://github.com/kubernetes/kubernetes/issues/102106
- https://github.com/kubernetes/kubernetes/issues/102106
- https://groups.google.com/g/kubernetes-security-announce/c/xAiN3924thY
- https://groups.google.com/g/kubernetes-security-announce/c/xAiN3924thY
- https://security.netapp.com/advisory/ntap-20211004-0004/
- https://security.netapp.com/advisory/ntap-20211004-0004/
Modified: 2024-11-21
CVE-2021-25741
A security issue was discovered in Kubernetes where a user may be able to create a container with subpath volume mounts to access files & directories outside of the volume, including on the host filesystem.
- https://github.com/kubernetes/kubernetes/issues/104980
- https://github.com/kubernetes/kubernetes/issues/104980
- https://groups.google.com/g/kubernetes-security-announce/c/nyfdhK24H7s
- https://groups.google.com/g/kubernetes-security-announce/c/nyfdhK24H7s
- https://security.netapp.com/advisory/ntap-20211008-0006/
- https://security.netapp.com/advisory/ntap-20211008-0006/