-
Notifications
You must be signed in to change notification settings - Fork 41
chore(deps): update module k8s.io/kubernetes to v1.32.4 [security] (release-v0.19) #422
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: release-v0.19
Are you sure you want to change the base?
Conversation
Signed-off-by: redhat-renovate-bot <[email protected]>
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@redhat-renovate-bot: The following tests failed, say
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
This PR contains the following updates:
v1.15.0-alpha.0
->v1.32.4
Server Side Request Forgery (SSRF) in Kubernetes
CVE-2020-8555 / GHSA-x6mj-w4jf-jmgw / GO-2022-0890
More information
Details
The Kubernetes kube-controller-manager in versions v1.0-1.14, versions prior to v1.15.12, v1.16.9, v1.17.5, and version v1.18.0 are vulnerable to a Server Side Request Forgery (SSRF) that allows certain authorized users to leak up to 500 bytes of arbitrary information from unprotected endpoints within the master's host network (such as link-local or loopback services).
Severity
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Server Side Request Forgery (SSRF) in Kubernetes in k8s.io/kubernetes
CVE-2020-8555 / GHSA-x6mj-w4jf-jmgw / GO-2022-0890
More information
Details
Server Side Request Forgery (SSRF) in Kubernetes in k8s.io/kubernetes
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
Kubernetes client-go library logs may disclose credentials to unauthorized users
CVE-2019-11250 / GHSA-jmrx-5g74-6v2f / GO-2021-0065
More information
Details
The Kubernetes client-go library logs request headers at verbosity levels of 7 or higher. This can disclose credentials to unauthorized users via logs or command output. Kubernetes components (such as kube-apiserver) prior to v1.16.0, which make use of basic or bearer token authentication, and run at high verbosity levels, are affected.
Severity
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Improper Authentication in Kubernetes in k8s.io/kubernetes
CVE-2020-8558 / GHSA-wqv3-8cm6-h6wg / GO-2022-0885
More information
Details
Improper Authentication in Kubernetes in k8s.io/kubernetes
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
Improper Authentication in Kubernetes
CVE-2020-8558 / GHSA-wqv3-8cm6-h6wg / GO-2022-0885
More information
Details
A security issue was discovered in the Kubelet and kube-proxy components of Kubernetes which allows adjacent hosts to reach TCP and UDP services bound to 127.0.0.1 running on the node or in the node's network namespace. For example, if a cluster administrator runs a TCP service on a node that listens on 127.0.0.1:1234, because of this bug, that service would be potentially reachable by other hosts on the same LAN as the node, or by containers running on the same node as the service. If the example service on port 1234 required no additional authentication (because it assumed that only other localhost processes could reach it), then it could be vulnerable to attacks that make use of this bug.
Severity
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Denial of service in Kubernetes in k8s.io/kubernetes
CVE-2020-8557 / GHSA-55qj-gj3x-jq9r / GO-2024-2753
More information
Details
Denial of service in Kubernetes in k8s.io/kubernetes
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
Privilege Escalation in Kubernetes
CGA-j37w-9p7g-v3pm / CVE-2020-8559 / GHSA-33c5-9fx5-fvjm / GO-2024-2748
More information
Details
The Kubernetes kube-apiserver in versions v1.6-v1.15, and versions prior to v1.16.13, v1.17.9 and v1.18.7 are vulnerable to an unvalidated redirect on proxied upgrade requests that could allow an attacker to escalate privileges from a node compromise to a full cluster compromise.
Severity
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Privilege Escalation in Kubernetes in k8s.io/apimachinery
CGA-j37w-9p7g-v3pm / CVE-2020-8559 / GHSA-33c5-9fx5-fvjm / GO-2024-2748
More information
Details
The Kubernetes kube-apiserver is vulnerable to an unvalidated redirect on proxied upgrade requests that could allow an attacker to escalate privileges from a node compromise to a full cluster compromise.
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
CVE-2020-8566 / GHSA-5x96-j797-5qqw / GO-2024-2754
More information
Details
Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
Access Restriction Bypass in kube-apiserver
CVE-2021-25735 / GHSA-g42g-737j-qx6j / GO-2022-0907
More information
Details
A vulnerability in Kubernetes
kube-apiserver
could allow node updates to bypass a Validating Admission Webhook and allow unauthorized node updates. The information that is provided to the admission controller could contain old configurations that overwrite values used for validation. Since the overwriting takes place before the validation, this could lead the admission controller to accept requests that should be blocked. The vulnerability can be exploited when an update action on node resources is performed and an admission controller is in place and configured to validate the action.Users are only affected by this vulnerability if they are running a Validating Admission Webhook for Nodes that denies admission based partially on the old state of the Node object. It only impacts validating admission plugins that rely on old values in certain fields and does not impact calls from kubelets that go through the built-in NodeRestriction admission plugin.
Severity
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Access Restriction Bypass in kube-apiserver in k8s.io/kubernetes
CVE-2021-25735 / GHSA-g42g-737j-qx6j / GO-2022-0907
More information
Details
Access Restriction Bypass in kube-apiserver in k8s.io/kubernetes
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
Potential proxy IP restriction bypass in Kubernetes
CVE-2020-8562 / GHSA-qh36-44jv-c8xj
More information
Details
As mitigations to a report from 2019 and CVE-2020-8555, Kubernetes attempts to prevent proxied connections from accessing link-local or localhost networks when making user-driven connections to Services, Pods, Nodes, or StorageClass service providers. As part of this mitigation Kubernetes does a DNS name resolution check and validates that response IPs are not in the link-local (169.254.0.0/16) or localhost (127.0.0.0/8) range. Kubernetes then performs a second DNS resolution without validation for the actual connection. If a non-standard DNS server returns different non-cached responses, a user may be able to bypass the proxy IP restriction and access private networks on the control plane. All versions of Kubernetes are impacted, and there is no fix in place.
Severity
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
CVE-2020-8563 / GHSA-5xfg-wv98-264m / GO-2024-2755
More information
Details
Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
Files or Directories Accessible to External Parties in kubernetes in k8s.io/kubernetes
CVE-2021-25741 / GHSA-f5f7-6478-qm6p / GO-2022-0910
More information
Details
Files or Directories Accessible to External Parties in kubernetes in k8s.io/kubernetes
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
Files or Directories Accessible to External Parties in kubernetes
CVE-2021-25741 / GHSA-f5f7-6478-qm6p / GO-2022-0910
More information
Details
A security issue was discovered in Kubernetes where a user may be able to create a container with subpath volume mounts to access files & directories outside of the volume, including on the host filesystem.
Severity
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Sensitive information leak via log file in k8s.io/kubernetes
CVE-2020-8564 / GHSA-8mjg-8c8g-6h85 / GO-2021-0066
More information
Details
Attempting to read a malformed .dockercfg may cause secrets to be inappropriately logged.
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
Kubernetes Sensitive Information leak via Log File
CVE-2020-8564 / GHSA-8mjg-8c8g-6h85 / GO-2021-0066
More information
Details
In Kubernetes clusters using a logging level of at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. This affects < v1.19.3, < v1.18.10, < v1.17.13.
Severity
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Kubernetes client-go vulnerable to Sensitive Information Leak via Log File
CVE-2020-8565 / GHSA-8cfg-vx93-jvxw / GO-2021-0064
More information
Details
In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl. This affects <= v1.19.5, <= v1.18.13, <= v1.17.15, < v1.20.0-alpha2.
Severity
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Kube-proxy may unintentionally forward traffic in k8s.io/kubernetes
CVE-2021-25736 / GHSA-35c7-w35f-xwgh / GO-2023-2159
More information
Details
Kube-proxy may unintentionally forward traffic in k8s.io/kubernetes
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
Unverified Ownership in Kubernetes
CVE-2020-8554 / GHSA-j9wf-vvm6-4r9w
More information
Details
Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typically be granted to users) of a LoadBalancer service can set the status.loadBalancer.ingress.ip to similar effect.
Severity
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Confused Deputy in Kubernetes
CVE-2020-8561 / GHSA-74j8-88mm-7496
More information
Details
A security issue was discovered in Kubernetes where actors that control the responses of MutatingWebhookConfiguration or ValidatingWebhookConfiguration requests are able to redirect kube-apiserver requests to private networks of the apiserver. If that user can view kube-apiserver logs when the log level is set to 10, they can view the redirected responses and headers in the logs.
Severity
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Confused Deputy in Kubernetes
CVE-2021-25740 / GHSA-vw47-mr44-3jf9
More information
Details
A security issue was discovered with Kubernetes that could enable users to send network traffic to locations they would otherwise not have access to via a confused deputy attack.
Severity
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Kubelet vulnerable to bypass of seccomp profile enforcement
CVE-2023-2431 / GHSA-xc8m-28vv-4pjc / GO-2023-1864
More information
Details
A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This bug affects Kubelet.
Severity
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Kubelet vulnerable to bypass of seccomp profile enforcement in k8s.io/kubernetes
CVE-2023-2431 / GHSA-xc8m-28vv-4pjc / GO-2023-1864
More information
Details
Kubelet vulnerable to bypass of seccomp profile enforcement in k8s.io/kubernetes
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
Kubernetes mountable secrets policy bypass
CVE-2023-2728 / GHSA-cgcv-5272-97pr / GO-2023-1892
More information
Details
Users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using ephemeral containers. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the
kubernetes.io/enforce-mountable-secrets
annotation are used together with ephemeral containers.Severity
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Kubernetes mountable secrets policy bypass in k8s.io/kubernetes
CVE-2023-2728 / GHSA-cgcv-5272-97pr / GO-2023-1892
More information
Details
Kubernetes mountable secrets policy bypass in k8s.io/kubernetes
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
kube-apiserver vulnerable to policy bypass
CVE-2023-2727 / GHSA-qc2g-gmh6-95p4 / GO-2023-1891
More information
Details
Users may be able to launch containers using images that are restricted by ImagePolicyWebhook when using ephemeral containers. Kubernetes clusters are only affected if the ImagePolicyWebhook admission plugin is used together with ephemeral containers.
Severity
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
kube-apiserver vulnerable to policy bypass in k8s.io/kubernetes
CVE-2023-2727 / GHSA-qc2g-gmh6-95p4 / GO-2023-1891
More information
Details
kube-apiserver vulnerable to policy bypass in k8s.io/kubernetes
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
Insufficient input sanitization on Windows nodes leads to privilege escalation in k8s.io/kubernetes
CVE-2023-3676 / GHSA-7fxm-f474-hf8w / GO-2023-2330
More information
Details
A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes.
Severity
Unknown
References