ALT-PU-2025-10686-4
Closed vulnerabilities
BDU:2025-09391
Уязвимость демона firewalld программного средства для создания систем контейнерной изоляции Moby, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2025-11272
Уязвимость пакетного менеджера для Kubernetes Helm, связанная с использованием неинициализированного ресурса, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-11274
Уязвимость пакетного менеджера для Kubernetes Helm, связанная с распределением ресурсов без ограничений и регулирования, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-8552
The Kubernetes API server component in versions prior to 1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via successful API requests.
- https://github.com/kubernetes/kubernetes/issues/89378
- https://groups.google.com/forum/#%21topic/kubernetes-security-announce/2UOlsba2g0s
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX/
- https://security.netapp.com/advisory/ntap-20200413-0003/
- https://github.com/kubernetes/kubernetes/issues/89378
- https://groups.google.com/forum/#%21topic/kubernetes-security-announce/2UOlsba2g0s
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX/
- https://security.netapp.com/advisory/ntap-20200413-0003/
Modified: 2025-09-08
CVE-2025-54388
Moby is an open source container framework developed by Docker Inc. that is distributed as Docker Engine, Mirantis Container Runtime, and various other downstream projects/products. In versions 28.2.0 through 28.3.2, when the firewalld service is reloaded it removes all iptables rules including those created by Docker. While Docker should automatically recreate these rules, versions before 28.3.3 fail to recreate the specific rules that block external access to containers. This means that after a firewalld reload, containers with ports published to localhost (like 127.0.0.1:8080) become accessible from remote machines that have network routing to the Docker bridge, even though they should only be accessible from the host itself. The vulnerability only affects explicitly published ports - unpublished ports remain protected. This issue is fixed in version 28.3.3.
Modified: 2025-08-21
CVE-2025-55198
Helm is a package manager for Charts for Kubernetes. Prior to version 3.18.5, when parsing Chart.yaml and index.yaml files, an improper validation of type error can lead to a panic. This issue has been resolved in Helm 3.18.5. A workaround involves ensuring YAML files are formatted as Helm expects prior to processing them with Helm.
Modified: 2025-08-21
CVE-2025-55199
Helm is a package manager for Charts for Kubernetes. Prior to version 3.18.5, it is possible to craft a JSON Schema file in a manner which could cause Helm to use all available memory and have an out of memory (OOM) termination. This issue has been resolved in Helm 3.18.5. A workaround involves ensuring all Helm charts that are being loaded into Helm do not have any reference of $ref pointing to /dev/zero.
Modified: 2026-04-15
CVE-2025-8556
A flaw was found in CIRCL's implementation of the FourQ elliptic curve. This vulnerability allows an attacker to compromise session security via low-order point injection and incorrect point validation during Diffie-Hellman key exchange.
- https://access.redhat.com/security/cve/CVE-2025-8556
- https://bugzilla.redhat.com/show_bug.cgi?id=2371624
- https://github.com/cloudflare/circl
- https://github.com/cloudflare/circl/security/advisories/GHSA-2x5j-vhc8-9cwm
- https://github.com/cloudflare/circl/tree/v1.6.1
- https://news.ycombinator.com/item?id=45669593
- https://www.botanica.software/blog/cryptographic-issues-in-cloudflares-circl-fourq-implementation
Modified: 2025-10-23
GHSA-2x5j-vhc8-9cwm
CIRCL-Fourq: Missing and wrong validation can lead to incorrect results
- https://github.com/cloudflare/circl/security/advisories/GHSA-2x5j-vhc8-9cwm
- https://nvd.nist.gov/vuln/detail/CVE-2025-8556
- https://access.redhat.com/security/cve/CVE-2025-8556
- https://bugzilla.redhat.com/show_bug.cgi?id=2371624
- https://github.com/cloudflare/circl
- https://github.com/cloudflare/circl/tree/v1.6.1
- https://news.ycombinator.com/item?id=45669593
- https://www.botanica.software/blog/cryptographic-issues-in-cloudflares-circl-fourq-implementation
Modified: 2023-09-21
GHSA-82hx-w2r5-c2wq
Kubernetes API Server DoS Via API Requests
- https://nvd.nist.gov/vuln/detail/CVE-2020-8552
- https://github.com/kubernetes/kubernetes/issues/89378
- https://github.com/kubernetes/kubernetes/pull/87669
- https://github.com/kubernetes/kubernetes/commit/5978856c4c7f10737a11c9540fe60b8475beecbb
- https://groups.google.com/forum/#!topic/kubernetes-security-announce/2UOlsba2g0s
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX
- https://security.netapp.com/advisory/ntap-20200413-0003
Modified: 2025-08-14
GHSA-9h84-qmv7-982p
Helm Charts with Specific JSON Schema Values Can Cause Memory Exhaustion
Modified: 2025-08-14
GHSA-f9f8-9pmf-xv68
Helm May Panic Due To Incorrect YAML Content
GHSA-fv92-fjc5-jj9h
mapstructure May Leak Sensitive Information in Logs When Processing Malformed Data
Modified: 2025-09-11
GHSA-x4rx-4gw3-53p4
Moby firewalld reload makes published container ports accessible from remote hosts
