Описание
The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on port 10250.
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
devel | not-affected | code not present |
eoan | not-affected | code not present |
esm-infra-legacy/trusty | DNE | |
precise/esm | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | needs-triage | |
xenial | DNE |
Показывать по
EPSS
3.3 Low
CVSS2
4.3 Medium
CVSS3
Связанные уязвимости
The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on port 10250.
The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on port 10250.
The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1. ...
Allocation of Resources Without Limits or Throttling and Uncontrolled Memory Allocation in Kubernetes
EPSS
3.3 Low
CVSS2
4.3 Medium
CVSS3