Описание
Kube-proxy on Windows can unintentionally forward traffic to local processes listening on the same port (“spec.ports[*].port”) as a LoadBalancer Service when the LoadBalancer controller does not set the “status.loadBalancer.ingress[].ip” field. Clusters where the LoadBalancer controller sets the “status.loadBalancer.ingress[].ip” field are unaffected.
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
devel | not-affected | windows only |
esm-apps/focal | not-affected | windows only |
esm-infra-legacy/trusty | DNE | |
focal | not-affected | windows only |
groovy | not-affected | windows only |
hirsute | not-affected | windows only |
precise/esm | DNE | |
trusty | DNE | |
trusty/esm | DNE |
Показывать по
Ссылки на источники
EPSS
5.8 Medium
CVSS3
Связанные уязвимости
Kube-proxy on Windows can unintentionally forward traffic to local processes listening on the same port (“spec.ports[*].port”) as a LoadBalancer Service when the LoadBalancer controller does not set the “status.loadBalancer.ingress[].ip” field. Clusters where the LoadBalancer controller sets the “status.loadBalancer.ingress[].ip” field are unaffected.
Kube-proxy on Windows can unintentionally forward traffic to local processes listening on the same port (“spec.ports[*].port”) as a LoadBalancer Service when the LoadBalancer controller does not set the “status.loadBalancer.ingress[].ip” field. Clusters where the LoadBalancer controller sets the “status.loadBalancer.ingress[].ip” field are unaffected.
Kube-proxy on Windows can unintentionally forward traffic to local pr ...
Kube-proxy may unintentionally forward traffic
EPSS
5.8 Medium
CVSS3