Описание
The Kubelet and kube-proxy components in versions 1.1.0-1.16.10, 1.17.0-1.17.6, and 1.18.0-1.18.3 were found to contain a security issue which allows adjacent hosts to reach TCP and UDP services bound to 127.0.0.1 running on the node or in the node's network namespace. Such a service is generally thought to be reachable only by other processes on the same host, but due to this defeect, could be reachable by other hosts on the same LAN as the node, or by containers running on the same node as the service.
A flaw was found in Kubernetes that allows attackers on adjacent networks to reach services exposed on localhost ports, previously thought to be unreachable. This flaw allows an attacker to gain privileges or access confidential information for any services listening on localhost ports that are not protected by authentication.
Отчет
OpenShift Container Platform does not expose the API server on a localhost port without authentication. The only service exposed on a localhost port not protected by authentication is Metrics, which exposes some cluster metadata.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Storage 3 | heketi | Not affected | ||
Red Hat OpenShift Container Platform 3.11 | atomic-openshift | Fixed | RHSA-2020:2992 | 27.07.2020 |
Red Hat OpenShift Container Platform 4.3 | openshift | Fixed | RHSA-2020:3183 | 05.08.2020 |
Red Hat OpenShift Container Platform 4.3 | openshift4/ose-hyperkube | Fixed | RHSA-2020:3184 | 05.08.2020 |
Red Hat OpenShift Container Platform 4.4 | openshift4/ose-hyperkube | Fixed | RHSA-2020:2926 | 21.07.2020 |
Red Hat OpenShift Container Platform 4.4 | openshift | Fixed | RHSA-2020:2927 | 21.07.2020 |
Red Hat OpenShift Container Platform 4.5 | openshift4/ose-hyperkube | Fixed | RHSA-2020:2412 | 13.07.2020 |
Red Hat OpenShift Container Platform 4.5 | openshift | Fixed | RHSA-2020:2413 | 13.07.2020 |
Показывать по
Дополнительная информация
Статус:
EPSS
5.4 Medium
CVSS3
Связанные уязвимости
The Kubelet and kube-proxy components in versions 1.1.0-1.16.10, 1.17.0-1.17.6, and 1.18.0-1.18.3 were found to contain a security issue which allows adjacent hosts to reach TCP and UDP services bound to 127.0.0.1 running on the node or in the node's network namespace. Such a service is generally thought to be reachable only by other processes on the same host, but due to this defeect, could be reachable by other hosts on the same LAN as the node, or by containers running on the same node as the service.
The Kubelet and kube-proxy components in versions 1.1.0-1.16.10, 1.17.0-1.17.6, and 1.18.0-1.18.3 were found to contain a security issue which allows adjacent hosts to reach TCP and UDP services bound to 127.0.0.1 running on the node or in the node's network namespace. Such a service is generally thought to be reachable only by other processes on the same host, but due to this defeect, could be reachable by other hosts on the same LAN as the node, or by containers running on the same node as the service.
The Kubelet and kube-proxy components in versions 1.1.0-1.16.10, 1.17. ...
EPSS
5.4 Medium
CVSS3