Описание
The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on port 10250.
Ссылки
- Issue TrackingPatchThird Party Advisory
- Third Party Advisory
- Issue TrackingPatchThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Одно из
EPSS
4.3 Medium
CVSS3
6.5 Medium
CVSS3
3.3 Low
CVSS2
Дефекты
Связанные уязвимости
The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on port 10250.
The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on port 10250.
The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1. ...
Allocation of Resources Without Limits or Throttling and Uncontrolled Memory Allocation in Kubernetes
EPSS
4.3 Medium
CVSS3
6.5 Medium
CVSS3
3.3 Low
CVSS2