Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-1002101 (GCVE-0-2017-1002101)
Vulnerability from cvelistv5
Published
2018-03-13 17:00
Modified
2024-08-05 22:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- handled symbolic links insecurely
Summary
In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host's filesystem.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Kubernetes | Kubernetes |
Version: v1.3.x Version: v1.4.x Version: v1.5.x Version: v1.6.x Version: unspecified < v1.7.14 Version: unspecified < v1.8.9 Version: unspecified < v1.9.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:00:41.667Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2018:0475", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:0475" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/kubernetes/kubernetes/issues/60813" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/bgeesaman/subpath-exploit/" }, { "name": "openSUSE-SU-2020:0554", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Kubernetes", "vendor": "Kubernetes", "versions": [ { "status": "affected", "version": "v1.3.x" }, { "status": "affected", "version": "v1.4.x" }, { "status": "affected", "version": "v1.5.x" }, { "status": "affected", "version": "v1.6.x" }, { "lessThan": "v1.7.14", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "v1.8.9", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "v1.9.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Reported by Maxim Ivanov" } ], "dateAssigned": "2017-12-06T00:00:00", "datePublic": "2018-03-05T00:00:00", "descriptions": [ { "lang": "en", "value": "In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host\u0027s filesystem." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "handled symbolic links insecurely", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-26T20:06:14", "orgId": "a6081bf6-c852-4425-ad4f-a67919267565", "shortName": "kubernetes" }, "references": [ { "name": "RHSA-2018:0475", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:0475" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/kubernetes/kubernetes/issues/60813" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/bgeesaman/subpath-exploit/" }, { "name": "openSUSE-SU-2020:0554", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@kubernetes.io", "DATE_ASSIGNED": "2017-12-06", "ID": "CVE-2017-1002101", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Kubernetes", "version": { "version_data": [ { "version_affected": "=", "version_value": "v1.3.x" }, { "version_affected": "=", "version_value": "v1.4.x" }, { "version_affected": "=", "version_value": "v1.5.x" }, { "version_affected": "=", "version_value": "v1.6.x" }, { "version_affected": "\u003c", "version_value": "v1.7.14" }, { "version_affected": "\u003c", "version_value": "v1.8.9" }, { "version_affected": "\u003c", "version_value": "v1.9.4" } ] } } ] }, "vendor_name": "Kubernetes" } ] } }, "credit": [ "Reported by Maxim Ivanov" ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host\u0027s filesystem." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "handled symbolic links insecurely" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2018:0475", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0475" }, { "name": "https://github.com/kubernetes/kubernetes/issues/60813", "refsource": "CONFIRM", "url": "https://github.com/kubernetes/kubernetes/issues/60813" }, { "name": "https://github.com/bgeesaman/subpath-exploit/", "refsource": "MISC", "url": "https://github.com/bgeesaman/subpath-exploit/" }, { "name": "openSUSE-SU-2020:0554", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "a6081bf6-c852-4425-ad4f-a67919267565", "assignerShortName": "kubernetes", "cveId": "CVE-2017-1002101", "datePublished": "2018-03-13T17:00:00", "dateReserved": "2017-12-07T00:00:00", "dateUpdated": "2024-08-05T22:00:41.667Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2017-1002101\",\"sourceIdentifier\":\"jordan@liggitt.net\",\"published\":\"2018-03-13T17:29:00.233\",\"lastModified\":\"2024-11-21T03:04:58.560\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host\u0027s filesystem.\"},{\"lang\":\"es\",\"value\":\"En Kubernetes, en versiones 1.3.x, 1.4.x, 1.5.x, 1.6.x y en versiones anteriores a la 1.7.14, 1.8.9 y 1.9.4, los contenedores que emplean montajes de volumen subpath con cualquier tipo de volumen (incluyendo pods no privilegiados, dependientes de los permisos de archivo) pueden acceder a archivos/directorios fuera del volumen, incluyendo el sistema de archivos del host.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"jordan@liggitt.net\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N\",\"baseScore\":9.6,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.1,\"impactScore\":5.8}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:P/A:N\",\"baseScore\":5.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-59\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.3.0\",\"versionEndIncluding\":\"1.3.10\",\"matchCriteriaId\":\"85841C2A-31F1-4725-BE9D-0E346D133CC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.0\",\"versionEndIncluding\":\"1.4.12\",\"matchCriteriaId\":\"3CE7BB45-879A-48CE-BE8B-463CB97B8ABA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.5.0\",\"versionEndIncluding\":\"1.5.8\",\"matchCriteriaId\":\"0990DE9E-F42A-42E5-9589-ACFCD79950E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.6.0\",\"versionEndIncluding\":\"1.6.13\",\"matchCriteriaId\":\"520D312F-37C8-4604-B4C3-D9DB8317CF9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.7.0\",\"versionEndExcluding\":\"1.7.14\",\"matchCriteriaId\":\"F39F83C4-3CC3-4681-8363-0986209D4E2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.8.0\",\"versionEndExcluding\":\"1.8.9\",\"matchCriteriaId\":\"CEE0979F-ED58-43D8-9E3B-7261B1782DD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.9.0\",\"versionEndExcluding\":\"1.9.4\",\"matchCriteriaId\":\"E4818E0C-B0ED-424F-AD73-B87777FD9D9E\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html\",\"source\":\"jordan@liggitt.net\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:0475\",\"source\":\"jordan@liggitt.net\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/bgeesaman/subpath-exploit/\",\"source\":\"jordan@liggitt.net\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/kubernetes/kubernetes/issues/60813\",\"source\":\"jordan@liggitt.net\",\"tags\":[\"Issue Tracking\",\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:0475\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/bgeesaman/subpath-exploit/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/kubernetes/kubernetes/issues/60813\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mitigation\",\"Vendor Advisory\"]}]}}" } }
gsd-2017-1002101
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host's filesystem.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2017-1002101", "description": "In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host\u0027s filesystem.", "id": "GSD-2017-1002101", "references": [ "https://www.suse.com/security/cve/CVE-2017-1002101.html", "https://access.redhat.com/errata/RHSA-2018:0475", "https://linux.oracle.com/cve/CVE-2017-1002101.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-1002101" ], "details": "In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host\u0027s filesystem.", "id": "GSD-2017-1002101", "modified": "2023-12-13T01:21:12.278045Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@kubernetes.io", "DATE_ASSIGNED": "2017-12-06", "ID": "CVE-2017-1002101", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Kubernetes", "version": { "version_data": [ { "version_affected": "=", "version_value": "v1.3.x" }, { "version_affected": "=", "version_value": "v1.4.x" }, { "version_affected": "=", "version_value": "v1.5.x" }, { "version_affected": "=", "version_value": "v1.6.x" }, { "version_affected": "\u003c", "version_value": "v1.7.14" }, { "version_affected": "\u003c", "version_value": "v1.8.9" }, { "version_affected": "\u003c", "version_value": "v1.9.4" } ] } } ] }, "vendor_name": "Kubernetes" } ] } }, "credit": [ "Reported by Maxim Ivanov" ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host\u0027s filesystem." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "handled symbolic links insecurely" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2018:0475", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0475" }, { "name": "https://github.com/kubernetes/kubernetes/issues/60813", "refsource": "CONFIRM", "url": "https://github.com/kubernetes/kubernetes/issues/60813" }, { "name": "https://github.com/bgeesaman/subpath-exploit/", "refsource": "MISC", "url": "https://github.com/bgeesaman/subpath-exploit/" }, { "name": "openSUSE-SU-2020:0554", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003e=v1.3.0 \u003c=v1.3.10 || \u003e=v1.4.0 \u003c=v1.4.12 || \u003e=v1.5.0 \u003c=v1.5.8 || \u003e=v1.6.0 \u003c=v1.6.13 || \u003e=v1.7.0 \u003cv1.7.14 || \u003e=v1.8.0 \u003cv1.8.9 || \u003e=v1.9.0 \u003cv1.9.4", "affected_versions": "All versions starting from 1.3.0 up to 1.3.10, all versions starting from 1.4.0 up to 1.4.12, all versions starting from 1.5.0 up to 1.5.8, all versions starting from 1.6.0 up to 1.6.13, all versions starting from 1.7.0 before 1.7.14, all versions starting from 1.8.0 before 1.8.9, all versions starting from 1.9.0 before 1.9.4", "cvss_v2": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", "cwe_ids": [ "CWE-1035", "CWE-59", "CWE-937" ], "date": "2019-10-09", "description": "In Kubernetes, containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions), can access files and directories outside the volume, including the host\u0027s filesystem.", "fixed_versions": [ "v1.3.11", "v1.5.9", "v1.6.14", "v1.7.14", "v1.8.9", "v1.9.4" ], "identifier": "CVE-2017-1002101", "identifiers": [ "CVE-2017-1002101" ], "not_impacted": "All versions before 1.3.0, all versions after 1.3.10 before 1.4.0, all versions after 1.4.12 before 1.5.0, all versions after 1.5.8 before 1.6.0, all versions after 1.6.13 before 1.7.0, all versions starting from 1.7.14 before 1.8.0, all versions starting from 1.8.9 before 1.9.0, all versions starting from 1.9.4", "package_slug": "go/github.com/kubernetes/kubernetes", "pubdate": "2018-03-13", "solution": "Upgrade to versions 1.3.11, 1.5.0, 1.5.9, 1.6.14, 1.7.14, 1.8.9, 1.9.4 or above.", "title": "Improper Link Resolution Before File Access", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2017-1002101", "https://github.com/kubernetes/kubernetes/issues/60813" ], "uuid": "000f41ab-a68c-4bdd-98ce-f6b8b3fe5a61", "versions": [ { "commit": { "sha": "346bcde207a77e555fa87fe3de4262ee1f9e24bf", "tags": [ "v1.3.0" ], "timestamp": "20160701211906" }, "number": "v1.3.0" }, { "commit": { "sha": "1b38de6a9dbcd8c4f613449e4fcf190d36751682", "tags": [ "v1.4.0" ], "timestamp": "20160926200947" }, "number": "v1.4.0" }, { "commit": { "sha": "c46df74c5df2b59ac99a39ee29e0949926b2a466", "tags": [ "v1.3.10" ], "timestamp": "20161031220611" }, "number": "v1.3.10" }, { "commit": { "sha": "86f65a0933ad97533eacf371fabc8d666229dd57", "tags": [ "v1.3.11-beta.0" ], "timestamp": "20161031224214" }, "number": "v1.3.11" }, { "commit": { "sha": "c7761bada49581ee1813737764c007d3e6a405b0", "tags": [ "v1.5.0" ], "timestamp": "20161213002943" }, "number": "v1.5.0" }, { "commit": { "sha": "7ee608dd786340302239f687b4dbe291ee78b5f3", "tags": [ "v1.6.0" ], "timestamp": "20170328182306" }, "number": "v1.6.0" }, { "commit": { "sha": "ed8752f8e505bc5c0a06bd67f1bcd9759ab718e3", "tags": [ "v1.4.12" ], "timestamp": "20170420225346" }, "number": "v1.4.12" }, { "commit": { "sha": "b6928f788afa6663acedb0dcfee3dcf0e16ece70", "tags": [ "v1.7.0" ], "timestamp": "20170630005316" }, "number": "v1.7.0" }, { "commit": { "sha": "36393a268be8e17af666236269f9c44959d8d716", "tags": [ "v1.8.0" ], "timestamp": "20170929001357" }, "number": "v1.8.0" }, { "commit": { "sha": "e78e52036b845abe70bec42392c8ec588292521a", "tags": [ "v1.5.8" ], "timestamp": "20171001015957" }, "number": "v1.5.8" }, { "commit": { "sha": "6b83a45d5cfe959518f000efc207db9619c34071", "tags": [ "v1.5.9-beta.0" ], "timestamp": "20171001030940" }, "number": "v1.5.9" }, { "commit": { "sha": "2f8d9f9bae634c34b5f9e002d78f350a50650655", "tags": [ "v1.6.13" ], "timestamp": "20171118002643" }, "number": "v1.6.13" }, { "commit": { "sha": "fd84a0b721a56c090bcd7d4b06f44645709955ac", "tags": [ "v1.6.14-beta.0" ], "timestamp": "20171122221405" }, "number": "v1.6.14" }, { "commit": { "sha": "65bb45a3ea941924154f24a08a1462d5ff084121", "tags": [ "v1.9.0" ], "timestamp": "20171214202037" }, "number": "v1.9.0" }, { "commit": { "sha": "5cdc7fc16d431c7ac1e0cae13330e05ac8e97a41", "tags": [ "v1.9.4" ], "timestamp": "20180312170313" }, "number": "v1.9.4" }, { "commit": { "sha": "b12ed27fcb9bad9f7438af9c7855d27dd1d9d2fb", "tags": [ "v1.8.9" ], "timestamp": "20180312170558" }, "number": "v1.8.9" }, { "commit": { "sha": "962389e2049bfffd0447fb60346df471bc9863f2", "tags": [ "v1.7.14" ], "timestamp": "20180312170713" }, "number": "v1.7.14" } ] } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.3.10", "versionStartIncluding": "1.3.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.4.12", "versionStartIncluding": "1.4.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.5.8", "versionStartIncluding": "1.5.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.6.13", "versionStartIncluding": "1.6.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.8.9", "versionStartIncluding": "1.8.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.7.14", "versionStartIncluding": "1.7.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.9.4", "versionStartIncluding": "1.9.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@kubernetes.io", "ID": "CVE-2017-1002101" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host\u0027s filesystem." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-59" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/kubernetes/kubernetes/issues/60813", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Mitigation", "Vendor Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/60813" }, { "name": "RHSA-2018:0475", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:0475" }, { "name": "https://github.com/bgeesaman/subpath-exploit/", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/bgeesaman/subpath-exploit/" }, { "name": "openSUSE-SU-2020:0554", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 3.1, "impactScore": 5.8 } }, "lastModifiedDate": "2019-10-09T23:21Z", "publishedDate": "2018-03-13T17:29Z" } } }
rhsa-2018:0475
Vulnerability from csaf_redhat
Published
2018-03-12 19:40
Modified
2024-11-22 11:47
Summary
Red Hat Security Advisory: Red Hat OpenShift Container Platform security update
Notes
Topic
An update is now available for Red Hat OpenShift Container Platform 3.7, 3.6, 3.5, 3.4, and 3.3.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenShift Container Platform by Red Hat is the company's cloud computing Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud deployments.
This advisory contains the RPM packages for this release. See the following advisory for the container images for this release:
https://access.redhat.com/errata/RHBA-2018:0476
All OpenShift Container Platform 3 users are advised to upgrade to these updated packages and images.
Security Fix(es):
* kubernetes: Volume security can be sidestepped with innocent emptyDir and subpath (CVE-2017-1002101)
* pod: Malicious containers can delete any file from the node (CVE-2017-1002102)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift Container Platform 3.7, 3.6, 3.5, 3.4, and 3.3.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Container Platform by Red Hat is the company\u0027s cloud computing Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the RPM packages for this release. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHBA-2018:0476\n\nAll OpenShift Container Platform 3 users are advised to upgrade to these updated packages and images.\n\nSecurity Fix(es):\n\n* kubernetes: Volume security can be sidestepped with innocent emptyDir and subpath (CVE-2017-1002101)\n\n* pod: Malicious containers can delete any file from the node (CVE-2017-1002102)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:0475", "url": "https://access.redhat.com/errata/RHSA-2018:0475" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1525130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525130" }, { "category": "external", "summary": "1551818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551818" }, { "category": "external", "summary": "1554174", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554174" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0475.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Container Platform security update", "tracking": { "current_release_date": "2024-11-22T11:47:31+00:00", "generator": { "date": "2024-11-22T11:47:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:0475", "initial_release_date": "2018-03-12T19:40:44+00:00", "revision_history": [ { "date": "2018-03-12T19:40:44+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-03-12T19:40:44+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T11:47:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.3", "product": { "name": "Red Hat OpenShift Container Platform 3.3", "product_id": "7Server-RH7-RHOSE-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.3::el7" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.4", "product": { "name": "Red Hat OpenShift Container Platform 3.4", "product_id": "7Server-RH7-RHOSE-3.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.4::el7" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.5", "product": { "name": "Red Hat OpenShift Container Platform 3.5", "product_id": "7Server-RH7-RHOSE-3.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.5::el7" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.6", "product": { "name": "Red Hat OpenShift Container Platform 3.6", "product_id": "7Server-RH7-RHOSE-3.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.6::el7" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.7", "product": { "name": "Red Hat OpenShift Container Platform 3.7", "product_id": "7Server-RH7-RHOSE-3.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.7::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "product": { "name": "atomic-openshift-sdn-ovs-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "product_id": "atomic-openshift-sdn-ovs-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-sdn-ovs@3.3.1.46.11-1.git.4.e236015.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "product": { "name": "atomic-openshift-master-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "product_id": "atomic-openshift-master-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-master@3.3.1.46.11-1.git.4.e236015.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-redistributable-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "product": { "name": "atomic-openshift-clients-redistributable-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "product_id": "atomic-openshift-clients-redistributable-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients-redistributable@3.3.1.46.11-1.git.4.e236015.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "product": { "name": "atomic-openshift-pod-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "product_id": "atomic-openshift-pod-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-pod@3.3.1.46.11-1.git.4.e236015.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "product": { "name": "atomic-openshift-clients-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "product_id": "atomic-openshift-clients-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients@3.3.1.46.11-1.git.4.e236015.el7?arch=x86_64" } } }, { "category": "product_version", "name": "tuned-profiles-atomic-openshift-node-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "product": { "name": "tuned-profiles-atomic-openshift-node-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "product_id": "tuned-profiles-atomic-openshift-node-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tuned-profiles-atomic-openshift-node@3.3.1.46.11-1.git.4.e236015.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "product": { "name": "atomic-openshift-tests-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "product_id": "atomic-openshift-tests-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-tests@3.3.1.46.11-1.git.4.e236015.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-dockerregistry-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "product": { "name": "atomic-openshift-dockerregistry-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "product_id": "atomic-openshift-dockerregistry-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-dockerregistry@3.3.1.46.11-1.git.4.e236015.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "product": { "name": "atomic-openshift-node-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "product_id": "atomic-openshift-node-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node@3.3.1.46.11-1.git.4.e236015.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "product": { "name": "atomic-openshift-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "product_id": "atomic-openshift-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift@3.3.1.46.11-1.git.4.e236015.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "product": { "name": "atomic-openshift-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "product_id": "atomic-openshift-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift@3.4.1.44.38-1.git.4.bb8df08.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "product": { "name": "atomic-openshift-tests-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "product_id": "atomic-openshift-tests-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-tests@3.4.1.44.38-1.git.4.bb8df08.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-dockerregistry-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "product": { "name": "atomic-openshift-dockerregistry-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "product_id": "atomic-openshift-dockerregistry-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-dockerregistry@3.4.1.44.38-1.git.4.bb8df08.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "product": { "name": "atomic-openshift-node-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "product_id": "atomic-openshift-node-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node@3.4.1.44.38-1.git.4.bb8df08.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "product": { "name": "atomic-openshift-pod-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "product_id": "atomic-openshift-pod-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-pod@3.4.1.44.38-1.git.4.bb8df08.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "product": { "name": "atomic-openshift-clients-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "product_id": "atomic-openshift-clients-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients@3.4.1.44.38-1.git.4.bb8df08.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-redistributable-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "product": { "name": "atomic-openshift-clients-redistributable-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "product_id": "atomic-openshift-clients-redistributable-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients-redistributable@3.4.1.44.38-1.git.4.bb8df08.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "product": { "name": "atomic-openshift-sdn-ovs-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "product_id": "atomic-openshift-sdn-ovs-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-sdn-ovs@3.4.1.44.38-1.git.4.bb8df08.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "product": { "name": "atomic-openshift-master-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "product_id": "atomic-openshift-master-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-master@3.4.1.44.38-1.git.4.bb8df08.el7?arch=x86_64" } } }, { "category": "product_version", "name": "tuned-profiles-atomic-openshift-node-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "product": { "name": "tuned-profiles-atomic-openshift-node-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "product_id": "tuned-profiles-atomic-openshift-node-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tuned-profiles-atomic-openshift-node@3.4.1.44.38-1.git.4.bb8df08.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "product": { "name": "atomic-openshift-master-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "product_id": "atomic-openshift-master-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-master@3.5.5.31.48-1.git.4.ff6153e.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-redistributable-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "product": { "name": "atomic-openshift-clients-redistributable-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "product_id": "atomic-openshift-clients-redistributable-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients-redistributable@3.5.5.31.48-1.git.4.ff6153e.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "product": { "name": "atomic-openshift-pod-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "product_id": "atomic-openshift-pod-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-pod@3.5.5.31.48-1.git.4.ff6153e.el7?arch=x86_64" } } }, { "category": "product_version", "name": "tuned-profiles-atomic-openshift-node-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "product": { "name": "tuned-profiles-atomic-openshift-node-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "product_id": "tuned-profiles-atomic-openshift-node-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tuned-profiles-atomic-openshift-node@3.5.5.31.48-1.git.4.ff6153e.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "product": { "name": "atomic-openshift-node-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "product_id": "atomic-openshift-node-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node@3.5.5.31.48-1.git.4.ff6153e.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "product": { "name": "atomic-openshift-tests-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "product_id": "atomic-openshift-tests-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-tests@3.5.5.31.48-1.git.4.ff6153e.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "product": { "name": "atomic-openshift-clients-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "product_id": "atomic-openshift-clients-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients@3.5.5.31.48-1.git.4.ff6153e.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "product": { "name": "atomic-openshift-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "product_id": "atomic-openshift-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift@3.5.5.31.48-1.git.4.ff6153e.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "product": { "name": "atomic-openshift-sdn-ovs-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "product_id": "atomic-openshift-sdn-ovs-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-sdn-ovs@3.5.5.31.48-1.git.4.ff6153e.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-dockerregistry-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "product": { "name": "atomic-openshift-dockerregistry-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "product_id": "atomic-openshift-dockerregistry-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-dockerregistry@3.5.5.31.48-1.git.4.ff6153e.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-service-catalog-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product": { "name": "atomic-openshift-service-catalog-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product_id": "atomic-openshift-service-catalog-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-catalog@3.6.173.0.96-1.git.4.e6301f8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-dockerregistry-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product": { "name": "atomic-openshift-dockerregistry-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product_id": "atomic-openshift-dockerregistry-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-dockerregistry@3.6.173.0.96-1.git.4.e6301f8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product": { "name": "atomic-openshift-sdn-ovs-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product_id": "atomic-openshift-sdn-ovs-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-sdn-ovs@3.6.173.0.96-1.git.4.e6301f8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-federation-services-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product": { "name": "atomic-openshift-federation-services-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product_id": "atomic-openshift-federation-services-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-federation-services@3.6.173.0.96-1.git.4.e6301f8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product": { "name": "atomic-openshift-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product_id": "atomic-openshift-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift@3.6.173.0.96-1.git.4.e6301f8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product": { "name": "atomic-openshift-pod-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product_id": "atomic-openshift-pod-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-pod@3.6.173.0.96-1.git.4.e6301f8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "tuned-profiles-atomic-openshift-node-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product": { "name": "tuned-profiles-atomic-openshift-node-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product_id": "tuned-profiles-atomic-openshift-node-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tuned-profiles-atomic-openshift-node@3.6.173.0.96-1.git.4.e6301f8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product": { "name": "atomic-openshift-tests-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product_id": "atomic-openshift-tests-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-tests@3.6.173.0.96-1.git.4.e6301f8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-capacity-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product": { "name": "atomic-openshift-cluster-capacity-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product_id": "atomic-openshift-cluster-capacity-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-cluster-capacity@3.6.173.0.96-1.git.4.e6301f8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product": { "name": "atomic-openshift-node-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product_id": "atomic-openshift-node-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node@3.6.173.0.96-1.git.4.e6301f8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product": { "name": "atomic-openshift-master-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product_id": "atomic-openshift-master-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-master@3.6.173.0.96-1.git.4.e6301f8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product": { "name": "atomic-openshift-clients-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product_id": "atomic-openshift-clients-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients@3.6.173.0.96-1.git.4.e6301f8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-redistributable-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product": { "name": "atomic-openshift-clients-redistributable-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product_id": "atomic-openshift-clients-redistributable-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients-redistributable@3.6.173.0.96-1.git.4.e6301f8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product": { "name": "atomic-openshift-master-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product_id": "atomic-openshift-master-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-master@3.7.23-1.git.5.83efd71.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-federation-services-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product": { "name": "atomic-openshift-federation-services-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product_id": "atomic-openshift-federation-services-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-federation-services@3.7.23-1.git.5.83efd71.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product": { "name": "atomic-openshift-tests-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product_id": "atomic-openshift-tests-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-tests@3.7.23-1.git.5.83efd71.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product": { "name": "atomic-openshift-pod-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product_id": "atomic-openshift-pod-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-pod@3.7.23-1.git.5.83efd71.el7?arch=x86_64" } } }, { "category": "product_version", "name": "tuned-profiles-atomic-openshift-node-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product": { "name": "tuned-profiles-atomic-openshift-node-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product_id": "tuned-profiles-atomic-openshift-node-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tuned-profiles-atomic-openshift-node@3.7.23-1.git.5.83efd71.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product": { "name": "atomic-openshift-clients-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product_id": "atomic-openshift-clients-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients@3.7.23-1.git.5.83efd71.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-redistributable-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product": { "name": "atomic-openshift-clients-redistributable-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product_id": "atomic-openshift-clients-redistributable-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients-redistributable@3.7.23-1.git.5.83efd71.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-template-service-broker-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product": { "name": "atomic-openshift-template-service-broker-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product_id": "atomic-openshift-template-service-broker-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-template-service-broker@3.7.23-1.git.5.83efd71.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-service-catalog-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product": { "name": "atomic-openshift-service-catalog-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product_id": "atomic-openshift-service-catalog-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-catalog@3.7.23-1.git.5.83efd71.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-dockerregistry-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product": { "name": "atomic-openshift-dockerregistry-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product_id": "atomic-openshift-dockerregistry-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-dockerregistry@3.7.23-1.git.5.83efd71.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product": { "name": "atomic-openshift-node-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product_id": "atomic-openshift-node-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node@3.7.23-1.git.5.83efd71.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-capacity-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product": { "name": "atomic-openshift-cluster-capacity-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product_id": "atomic-openshift-cluster-capacity-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-cluster-capacity@3.7.23-1.git.5.83efd71.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product": { "name": "atomic-openshift-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product_id": "atomic-openshift-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift@3.7.23-1.git.5.83efd71.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product": { "name": "atomic-openshift-sdn-ovs-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product_id": "atomic-openshift-sdn-ovs-0:3.7.23-1.git.5.83efd71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-sdn-ovs@3.7.23-1.git.5.83efd71.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-docker-excluder-0:3.3.1.46.11-1.git.4.e236015.el7.noarch", "product": { "name": "atomic-openshift-docker-excluder-0:3.3.1.46.11-1.git.4.e236015.el7.noarch", "product_id": "atomic-openshift-docker-excluder-0:3.3.1.46.11-1.git.4.e236015.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-docker-excluder@3.3.1.46.11-1.git.4.e236015.el7?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-excluder-0:3.3.1.46.11-1.git.4.e236015.el7.noarch", "product": { "name": "atomic-openshift-excluder-0:3.3.1.46.11-1.git.4.e236015.el7.noarch", "product_id": "atomic-openshift-excluder-0:3.3.1.46.11-1.git.4.e236015.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-excluder@3.3.1.46.11-1.git.4.e236015.el7?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-excluder-0:3.4.1.44.38-1.git.4.bb8df08.el7.noarch", "product": { "name": "atomic-openshift-excluder-0:3.4.1.44.38-1.git.4.bb8df08.el7.noarch", "product_id": "atomic-openshift-excluder-0:3.4.1.44.38-1.git.4.bb8df08.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-excluder@3.4.1.44.38-1.git.4.bb8df08.el7?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-docker-excluder-0:3.4.1.44.38-1.git.4.bb8df08.el7.noarch", "product": { "name": "atomic-openshift-docker-excluder-0:3.4.1.44.38-1.git.4.bb8df08.el7.noarch", "product_id": "atomic-openshift-docker-excluder-0:3.4.1.44.38-1.git.4.bb8df08.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-docker-excluder@3.4.1.44.38-1.git.4.bb8df08.el7?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-excluder-0:3.5.5.31.48-1.git.4.ff6153e.el7.noarch", "product": { "name": "atomic-openshift-excluder-0:3.5.5.31.48-1.git.4.ff6153e.el7.noarch", "product_id": "atomic-openshift-excluder-0:3.5.5.31.48-1.git.4.ff6153e.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-excluder@3.5.5.31.48-1.git.4.ff6153e.el7?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-docker-excluder-0:3.5.5.31.48-1.git.4.ff6153e.el7.noarch", "product": { "name": "atomic-openshift-docker-excluder-0:3.5.5.31.48-1.git.4.ff6153e.el7.noarch", "product_id": "atomic-openshift-docker-excluder-0:3.5.5.31.48-1.git.4.ff6153e.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-docker-excluder@3.5.5.31.48-1.git.4.ff6153e.el7?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-docker-excluder-0:3.6.173.0.96-1.git.4.e6301f8.el7.noarch", "product": { "name": "atomic-openshift-docker-excluder-0:3.6.173.0.96-1.git.4.e6301f8.el7.noarch", "product_id": "atomic-openshift-docker-excluder-0:3.6.173.0.96-1.git.4.e6301f8.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-docker-excluder@3.6.173.0.96-1.git.4.e6301f8.el7?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-excluder-0:3.6.173.0.96-1.git.4.e6301f8.el7.noarch", "product": { "name": "atomic-openshift-excluder-0:3.6.173.0.96-1.git.4.e6301f8.el7.noarch", "product_id": "atomic-openshift-excluder-0:3.6.173.0.96-1.git.4.e6301f8.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-excluder@3.6.173.0.96-1.git.4.e6301f8.el7?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-excluder-0:3.7.23-1.git.5.83efd71.el7.noarch", "product": { "name": "atomic-openshift-excluder-0:3.7.23-1.git.5.83efd71.el7.noarch", "product_id": "atomic-openshift-excluder-0:3.7.23-1.git.5.83efd71.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-excluder@3.7.23-1.git.5.83efd71.el7?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-docker-excluder-0:3.7.23-1.git.5.83efd71.el7.noarch", "product": { "name": "atomic-openshift-docker-excluder-0:3.7.23-1.git.5.83efd71.el7.noarch", "product_id": "atomic-openshift-docker-excluder-0:3.7.23-1.git.5.83efd71.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-docker-excluder@3.7.23-1.git.5.83efd71.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-0:3.3.1.46.11-1.git.4.e236015.el7.src", "product": { "name": "atomic-openshift-0:3.3.1.46.11-1.git.4.e236015.el7.src", "product_id": "atomic-openshift-0:3.3.1.46.11-1.git.4.e236015.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift@3.3.1.46.11-1.git.4.e236015.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.4.1.44.38-1.git.4.bb8df08.el7.src", "product": { "name": "atomic-openshift-0:3.4.1.44.38-1.git.4.bb8df08.el7.src", "product_id": "atomic-openshift-0:3.4.1.44.38-1.git.4.bb8df08.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift@3.4.1.44.38-1.git.4.bb8df08.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.5.5.31.48-1.git.4.ff6153e.el7.src", "product": { "name": "atomic-openshift-0:3.5.5.31.48-1.git.4.ff6153e.el7.src", "product_id": "atomic-openshift-0:3.5.5.31.48-1.git.4.ff6153e.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift@3.5.5.31.48-1.git.4.ff6153e.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.6.173.0.96-1.git.4.e6301f8.el7.src", "product": { "name": "atomic-openshift-0:3.6.173.0.96-1.git.4.e6301f8.el7.src", "product_id": "atomic-openshift-0:3.6.173.0.96-1.git.4.e6301f8.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift@3.6.173.0.96-1.git.4.e6301f8.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.7.23-1.git.5.83efd71.el7.src", "product": { "name": "atomic-openshift-0:3.7.23-1.git.5.83efd71.el7.src", "product_id": "atomic-openshift-0:3.7.23-1.git.5.83efd71.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift@3.7.23-1.git.5.83efd71.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.3.1.46.11-1.git.4.e236015.el7.src as a component of Red Hat OpenShift Container Platform 3.3", "product_id": "7Server-RH7-RHOSE-3.3:atomic-openshift-0:3.3.1.46.11-1.git.4.e236015.el7.src" }, "product_reference": "atomic-openshift-0:3.3.1.46.11-1.git.4.e236015.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.3", "product_id": "7Server-RH7-RHOSE-3.3:atomic-openshift-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64" }, "product_reference": "atomic-openshift-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.3", "product_id": "7Server-RH7-RHOSE-3.3:atomic-openshift-clients-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64" }, "product_reference": "atomic-openshift-clients-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-redistributable-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.3", "product_id": "7Server-RH7-RHOSE-3.3:atomic-openshift-clients-redistributable-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64" }, "product_reference": "atomic-openshift-clients-redistributable-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-docker-excluder-0:3.3.1.46.11-1.git.4.e236015.el7.noarch as a component of Red Hat OpenShift Container Platform 3.3", "product_id": "7Server-RH7-RHOSE-3.3:atomic-openshift-docker-excluder-0:3.3.1.46.11-1.git.4.e236015.el7.noarch" }, "product_reference": "atomic-openshift-docker-excluder-0:3.3.1.46.11-1.git.4.e236015.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-dockerregistry-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.3", "product_id": "7Server-RH7-RHOSE-3.3:atomic-openshift-dockerregistry-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64" }, "product_reference": "atomic-openshift-dockerregistry-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-excluder-0:3.3.1.46.11-1.git.4.e236015.el7.noarch as a component of Red Hat OpenShift Container Platform 3.3", "product_id": "7Server-RH7-RHOSE-3.3:atomic-openshift-excluder-0:3.3.1.46.11-1.git.4.e236015.el7.noarch" }, "product_reference": "atomic-openshift-excluder-0:3.3.1.46.11-1.git.4.e236015.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.3", "product_id": "7Server-RH7-RHOSE-3.3:atomic-openshift-master-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64" }, "product_reference": "atomic-openshift-master-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.3", "product_id": "7Server-RH7-RHOSE-3.3:atomic-openshift-node-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64" }, "product_reference": "atomic-openshift-node-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.3", "product_id": "7Server-RH7-RHOSE-3.3:atomic-openshift-pod-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64" }, "product_reference": "atomic-openshift-pod-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.3", "product_id": "7Server-RH7-RHOSE-3.3:atomic-openshift-sdn-ovs-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.3", "product_id": "7Server-RH7-RHOSE-3.3:atomic-openshift-tests-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64" }, "product_reference": "atomic-openshift-tests-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "tuned-profiles-atomic-openshift-node-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.3", "product_id": "7Server-RH7-RHOSE-3.3:tuned-profiles-atomic-openshift-node-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64" }, "product_reference": "tuned-profiles-atomic-openshift-node-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.4.1.44.38-1.git.4.bb8df08.el7.src as a component of Red Hat OpenShift Container Platform 3.4", "product_id": "7Server-RH7-RHOSE-3.4:atomic-openshift-0:3.4.1.44.38-1.git.4.bb8df08.el7.src" }, "product_reference": "atomic-openshift-0:3.4.1.44.38-1.git.4.bb8df08.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.4" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.4", "product_id": "7Server-RH7-RHOSE-3.4:atomic-openshift-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64" }, "product_reference": "atomic-openshift-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.4" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.4", "product_id": "7Server-RH7-RHOSE-3.4:atomic-openshift-clients-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64" }, "product_reference": "atomic-openshift-clients-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.4" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-redistributable-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.4", "product_id": "7Server-RH7-RHOSE-3.4:atomic-openshift-clients-redistributable-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64" }, "product_reference": "atomic-openshift-clients-redistributable-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.4" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-docker-excluder-0:3.4.1.44.38-1.git.4.bb8df08.el7.noarch as a component of Red Hat OpenShift Container Platform 3.4", "product_id": "7Server-RH7-RHOSE-3.4:atomic-openshift-docker-excluder-0:3.4.1.44.38-1.git.4.bb8df08.el7.noarch" }, "product_reference": "atomic-openshift-docker-excluder-0:3.4.1.44.38-1.git.4.bb8df08.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.4" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-dockerregistry-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.4", "product_id": "7Server-RH7-RHOSE-3.4:atomic-openshift-dockerregistry-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64" }, "product_reference": "atomic-openshift-dockerregistry-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.4" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-excluder-0:3.4.1.44.38-1.git.4.bb8df08.el7.noarch as a component of Red Hat OpenShift Container Platform 3.4", "product_id": "7Server-RH7-RHOSE-3.4:atomic-openshift-excluder-0:3.4.1.44.38-1.git.4.bb8df08.el7.noarch" }, "product_reference": "atomic-openshift-excluder-0:3.4.1.44.38-1.git.4.bb8df08.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.4" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.4", "product_id": "7Server-RH7-RHOSE-3.4:atomic-openshift-master-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64" }, "product_reference": "atomic-openshift-master-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.4" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.4", "product_id": "7Server-RH7-RHOSE-3.4:atomic-openshift-node-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64" }, "product_reference": "atomic-openshift-node-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.4" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.4", "product_id": "7Server-RH7-RHOSE-3.4:atomic-openshift-pod-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64" }, "product_reference": "atomic-openshift-pod-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.4" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.4", "product_id": "7Server-RH7-RHOSE-3.4:atomic-openshift-sdn-ovs-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.4" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.4", "product_id": "7Server-RH7-RHOSE-3.4:atomic-openshift-tests-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64" }, "product_reference": "atomic-openshift-tests-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.4" }, { "category": "default_component_of", "full_product_name": { "name": "tuned-profiles-atomic-openshift-node-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.4", "product_id": "7Server-RH7-RHOSE-3.4:tuned-profiles-atomic-openshift-node-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64" }, "product_reference": "tuned-profiles-atomic-openshift-node-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.4" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.5.5.31.48-1.git.4.ff6153e.el7.src as a component of Red Hat OpenShift Container Platform 3.5", "product_id": "7Server-RH7-RHOSE-3.5:atomic-openshift-0:3.5.5.31.48-1.git.4.ff6153e.el7.src" }, "product_reference": "atomic-openshift-0:3.5.5.31.48-1.git.4.ff6153e.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.5", "product_id": "7Server-RH7-RHOSE-3.5:atomic-openshift-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64" }, "product_reference": "atomic-openshift-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.5", "product_id": "7Server-RH7-RHOSE-3.5:atomic-openshift-clients-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64" }, "product_reference": "atomic-openshift-clients-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-redistributable-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.5", "product_id": "7Server-RH7-RHOSE-3.5:atomic-openshift-clients-redistributable-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64" }, "product_reference": "atomic-openshift-clients-redistributable-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-docker-excluder-0:3.5.5.31.48-1.git.4.ff6153e.el7.noarch as a component of Red Hat OpenShift Container Platform 3.5", "product_id": "7Server-RH7-RHOSE-3.5:atomic-openshift-docker-excluder-0:3.5.5.31.48-1.git.4.ff6153e.el7.noarch" }, "product_reference": "atomic-openshift-docker-excluder-0:3.5.5.31.48-1.git.4.ff6153e.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-dockerregistry-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.5", "product_id": "7Server-RH7-RHOSE-3.5:atomic-openshift-dockerregistry-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64" }, "product_reference": "atomic-openshift-dockerregistry-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-excluder-0:3.5.5.31.48-1.git.4.ff6153e.el7.noarch as a component of Red Hat OpenShift Container Platform 3.5", "product_id": "7Server-RH7-RHOSE-3.5:atomic-openshift-excluder-0:3.5.5.31.48-1.git.4.ff6153e.el7.noarch" }, "product_reference": "atomic-openshift-excluder-0:3.5.5.31.48-1.git.4.ff6153e.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.5", "product_id": "7Server-RH7-RHOSE-3.5:atomic-openshift-master-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64" }, "product_reference": "atomic-openshift-master-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.5", "product_id": "7Server-RH7-RHOSE-3.5:atomic-openshift-node-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64" }, "product_reference": "atomic-openshift-node-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.5", "product_id": "7Server-RH7-RHOSE-3.5:atomic-openshift-pod-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64" }, "product_reference": "atomic-openshift-pod-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.5", "product_id": "7Server-RH7-RHOSE-3.5:atomic-openshift-sdn-ovs-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.5", "product_id": "7Server-RH7-RHOSE-3.5:atomic-openshift-tests-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64" }, "product_reference": "atomic-openshift-tests-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "tuned-profiles-atomic-openshift-node-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.5", "product_id": "7Server-RH7-RHOSE-3.5:tuned-profiles-atomic-openshift-node-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64" }, "product_reference": "tuned-profiles-atomic-openshift-node-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.6.173.0.96-1.git.4.e6301f8.el7.src as a component of Red Hat OpenShift Container Platform 3.6", "product_id": "7Server-RH7-RHOSE-3.6:atomic-openshift-0:3.6.173.0.96-1.git.4.e6301f8.el7.src" }, "product_reference": "atomic-openshift-0:3.6.173.0.96-1.git.4.e6301f8.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.6", "product_id": "7Server-RH7-RHOSE-3.6:atomic-openshift-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64" }, "product_reference": "atomic-openshift-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.6", "product_id": "7Server-RH7-RHOSE-3.6:atomic-openshift-clients-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64" }, "product_reference": "atomic-openshift-clients-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-redistributable-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.6", "product_id": "7Server-RH7-RHOSE-3.6:atomic-openshift-clients-redistributable-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64" }, "product_reference": "atomic-openshift-clients-redistributable-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-capacity-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.6", "product_id": "7Server-RH7-RHOSE-3.6:atomic-openshift-cluster-capacity-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64" }, "product_reference": "atomic-openshift-cluster-capacity-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-docker-excluder-0:3.6.173.0.96-1.git.4.e6301f8.el7.noarch as a component of Red Hat OpenShift Container Platform 3.6", "product_id": "7Server-RH7-RHOSE-3.6:atomic-openshift-docker-excluder-0:3.6.173.0.96-1.git.4.e6301f8.el7.noarch" }, "product_reference": "atomic-openshift-docker-excluder-0:3.6.173.0.96-1.git.4.e6301f8.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-dockerregistry-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.6", "product_id": "7Server-RH7-RHOSE-3.6:atomic-openshift-dockerregistry-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64" }, "product_reference": "atomic-openshift-dockerregistry-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-excluder-0:3.6.173.0.96-1.git.4.e6301f8.el7.noarch as a component of Red Hat OpenShift Container Platform 3.6", "product_id": "7Server-RH7-RHOSE-3.6:atomic-openshift-excluder-0:3.6.173.0.96-1.git.4.e6301f8.el7.noarch" }, "product_reference": "atomic-openshift-excluder-0:3.6.173.0.96-1.git.4.e6301f8.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-federation-services-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.6", "product_id": "7Server-RH7-RHOSE-3.6:atomic-openshift-federation-services-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64" }, "product_reference": "atomic-openshift-federation-services-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.6", "product_id": "7Server-RH7-RHOSE-3.6:atomic-openshift-master-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64" }, "product_reference": "atomic-openshift-master-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.6", "product_id": "7Server-RH7-RHOSE-3.6:atomic-openshift-node-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64" }, "product_reference": "atomic-openshift-node-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.6", "product_id": "7Server-RH7-RHOSE-3.6:atomic-openshift-pod-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64" }, "product_reference": "atomic-openshift-pod-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.6", "product_id": "7Server-RH7-RHOSE-3.6:atomic-openshift-sdn-ovs-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-catalog-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.6", "product_id": "7Server-RH7-RHOSE-3.6:atomic-openshift-service-catalog-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64" }, "product_reference": "atomic-openshift-service-catalog-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.6", "product_id": "7Server-RH7-RHOSE-3.6:atomic-openshift-tests-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64" }, "product_reference": "atomic-openshift-tests-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "tuned-profiles-atomic-openshift-node-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.6", "product_id": "7Server-RH7-RHOSE-3.6:tuned-profiles-atomic-openshift-node-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64" }, "product_reference": "tuned-profiles-atomic-openshift-node-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.7.23-1.git.5.83efd71.el7.src as a component of Red Hat OpenShift Container Platform 3.7", "product_id": "7Server-RH7-RHOSE-3.7:atomic-openshift-0:3.7.23-1.git.5.83efd71.el7.src" }, "product_reference": "atomic-openshift-0:3.7.23-1.git.5.83efd71.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.7.23-1.git.5.83efd71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.7", "product_id": "7Server-RH7-RHOSE-3.7:atomic-openshift-0:3.7.23-1.git.5.83efd71.el7.x86_64" }, "product_reference": "atomic-openshift-0:3.7.23-1.git.5.83efd71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.7.23-1.git.5.83efd71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.7", "product_id": "7Server-RH7-RHOSE-3.7:atomic-openshift-clients-0:3.7.23-1.git.5.83efd71.el7.x86_64" }, "product_reference": "atomic-openshift-clients-0:3.7.23-1.git.5.83efd71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-redistributable-0:3.7.23-1.git.5.83efd71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.7", "product_id": "7Server-RH7-RHOSE-3.7:atomic-openshift-clients-redistributable-0:3.7.23-1.git.5.83efd71.el7.x86_64" }, "product_reference": "atomic-openshift-clients-redistributable-0:3.7.23-1.git.5.83efd71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-capacity-0:3.7.23-1.git.5.83efd71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.7", "product_id": "7Server-RH7-RHOSE-3.7:atomic-openshift-cluster-capacity-0:3.7.23-1.git.5.83efd71.el7.x86_64" }, "product_reference": "atomic-openshift-cluster-capacity-0:3.7.23-1.git.5.83efd71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-docker-excluder-0:3.7.23-1.git.5.83efd71.el7.noarch as a component of Red Hat OpenShift Container Platform 3.7", "product_id": "7Server-RH7-RHOSE-3.7:atomic-openshift-docker-excluder-0:3.7.23-1.git.5.83efd71.el7.noarch" }, "product_reference": "atomic-openshift-docker-excluder-0:3.7.23-1.git.5.83efd71.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-dockerregistry-0:3.7.23-1.git.5.83efd71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.7", "product_id": "7Server-RH7-RHOSE-3.7:atomic-openshift-dockerregistry-0:3.7.23-1.git.5.83efd71.el7.x86_64" }, "product_reference": "atomic-openshift-dockerregistry-0:3.7.23-1.git.5.83efd71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-excluder-0:3.7.23-1.git.5.83efd71.el7.noarch as a component of Red Hat OpenShift Container Platform 3.7", "product_id": "7Server-RH7-RHOSE-3.7:atomic-openshift-excluder-0:3.7.23-1.git.5.83efd71.el7.noarch" }, "product_reference": "atomic-openshift-excluder-0:3.7.23-1.git.5.83efd71.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-federation-services-0:3.7.23-1.git.5.83efd71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.7", "product_id": "7Server-RH7-RHOSE-3.7:atomic-openshift-federation-services-0:3.7.23-1.git.5.83efd71.el7.x86_64" }, "product_reference": "atomic-openshift-federation-services-0:3.7.23-1.git.5.83efd71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.7.23-1.git.5.83efd71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.7", "product_id": "7Server-RH7-RHOSE-3.7:atomic-openshift-master-0:3.7.23-1.git.5.83efd71.el7.x86_64" }, "product_reference": "atomic-openshift-master-0:3.7.23-1.git.5.83efd71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.7.23-1.git.5.83efd71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.7", "product_id": "7Server-RH7-RHOSE-3.7:atomic-openshift-node-0:3.7.23-1.git.5.83efd71.el7.x86_64" }, "product_reference": "atomic-openshift-node-0:3.7.23-1.git.5.83efd71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.7.23-1.git.5.83efd71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.7", "product_id": "7Server-RH7-RHOSE-3.7:atomic-openshift-pod-0:3.7.23-1.git.5.83efd71.el7.x86_64" }, "product_reference": "atomic-openshift-pod-0:3.7.23-1.git.5.83efd71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.7.23-1.git.5.83efd71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.7", "product_id": "7Server-RH7-RHOSE-3.7:atomic-openshift-sdn-ovs-0:3.7.23-1.git.5.83efd71.el7.x86_64" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.7.23-1.git.5.83efd71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-catalog-0:3.7.23-1.git.5.83efd71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.7", "product_id": "7Server-RH7-RHOSE-3.7:atomic-openshift-service-catalog-0:3.7.23-1.git.5.83efd71.el7.x86_64" }, "product_reference": "atomic-openshift-service-catalog-0:3.7.23-1.git.5.83efd71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-template-service-broker-0:3.7.23-1.git.5.83efd71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.7", "product_id": "7Server-RH7-RHOSE-3.7:atomic-openshift-template-service-broker-0:3.7.23-1.git.5.83efd71.el7.x86_64" }, "product_reference": "atomic-openshift-template-service-broker-0:3.7.23-1.git.5.83efd71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.7.23-1.git.5.83efd71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.7", "product_id": "7Server-RH7-RHOSE-3.7:atomic-openshift-tests-0:3.7.23-1.git.5.83efd71.el7.x86_64" }, "product_reference": "atomic-openshift-tests-0:3.7.23-1.git.5.83efd71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "tuned-profiles-atomic-openshift-node-0:3.7.23-1.git.5.83efd71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.7", "product_id": "7Server-RH7-RHOSE-3.7:tuned-profiles-atomic-openshift-node-0:3.7.23-1.git.5.83efd71.el7.x86_64" }, "product_reference": "tuned-profiles-atomic-openshift-node-0:3.7.23-1.git.5.83efd71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.7" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-1002101", "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1525130" } ], "notes": [ { "category": "description", "text": "It was found that volume security can be sidestepped with innocent emptyDir and subpath. This could give an attacker with access to a pod full control over the node host by gaining access to docker socket.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubernetes: Volume security can be sidestepped with innocent emptyDir and subpath", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw allows a pod to mount any part of the host filesystem. The pod will run with the security contraints placed on the user but could read anything with o=rx mode and appropriate SELinux label.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.3:atomic-openshift-0:3.3.1.46.11-1.git.4.e236015.el7.src", "7Server-RH7-RHOSE-3.3:atomic-openshift-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-clients-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-clients-redistributable-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-docker-excluder-0:3.3.1.46.11-1.git.4.e236015.el7.noarch", "7Server-RH7-RHOSE-3.3:atomic-openshift-dockerregistry-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-excluder-0:3.3.1.46.11-1.git.4.e236015.el7.noarch", "7Server-RH7-RHOSE-3.3:atomic-openshift-master-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-node-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-pod-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-sdn-ovs-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-tests-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:tuned-profiles-atomic-openshift-node-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-0:3.4.1.44.38-1.git.4.bb8df08.el7.src", "7Server-RH7-RHOSE-3.4:atomic-openshift-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-clients-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-clients-redistributable-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-docker-excluder-0:3.4.1.44.38-1.git.4.bb8df08.el7.noarch", "7Server-RH7-RHOSE-3.4:atomic-openshift-dockerregistry-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-excluder-0:3.4.1.44.38-1.git.4.bb8df08.el7.noarch", "7Server-RH7-RHOSE-3.4:atomic-openshift-master-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-node-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-pod-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-sdn-ovs-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-tests-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:tuned-profiles-atomic-openshift-node-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-0:3.5.5.31.48-1.git.4.ff6153e.el7.src", "7Server-RH7-RHOSE-3.5:atomic-openshift-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-clients-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-clients-redistributable-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-docker-excluder-0:3.5.5.31.48-1.git.4.ff6153e.el7.noarch", "7Server-RH7-RHOSE-3.5:atomic-openshift-dockerregistry-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-excluder-0:3.5.5.31.48-1.git.4.ff6153e.el7.noarch", "7Server-RH7-RHOSE-3.5:atomic-openshift-master-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-node-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-pod-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-sdn-ovs-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-tests-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:tuned-profiles-atomic-openshift-node-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-0:3.6.173.0.96-1.git.4.e6301f8.el7.src", "7Server-RH7-RHOSE-3.6:atomic-openshift-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-clients-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-clients-redistributable-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-cluster-capacity-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-docker-excluder-0:3.6.173.0.96-1.git.4.e6301f8.el7.noarch", "7Server-RH7-RHOSE-3.6:atomic-openshift-dockerregistry-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-excluder-0:3.6.173.0.96-1.git.4.e6301f8.el7.noarch", "7Server-RH7-RHOSE-3.6:atomic-openshift-federation-services-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-master-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-node-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-pod-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-sdn-ovs-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-service-catalog-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-tests-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:tuned-profiles-atomic-openshift-node-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-0:3.7.23-1.git.5.83efd71.el7.src", "7Server-RH7-RHOSE-3.7:atomic-openshift-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-clients-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-clients-redistributable-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-cluster-capacity-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-docker-excluder-0:3.7.23-1.git.5.83efd71.el7.noarch", "7Server-RH7-RHOSE-3.7:atomic-openshift-dockerregistry-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-excluder-0:3.7.23-1.git.5.83efd71.el7.noarch", "7Server-RH7-RHOSE-3.7:atomic-openshift-federation-services-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-master-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-node-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-pod-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-sdn-ovs-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-service-catalog-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-template-service-broker-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-tests-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:tuned-profiles-atomic-openshift-node-0:3.7.23-1.git.5.83efd71.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-1002101" }, { "category": "external", "summary": "RHBZ#1525130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525130" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-1002101", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1002101" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1002101", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1002101" }, { "category": "external", "summary": "https://github.com/kubernetes/kubernetes/issues/60813", "url": "https://github.com/kubernetes/kubernetes/issues/60813" } ], "release_date": "2018-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-03-12T19:40:44+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOSE-3.3:atomic-openshift-0:3.3.1.46.11-1.git.4.e236015.el7.src", "7Server-RH7-RHOSE-3.3:atomic-openshift-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-clients-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-clients-redistributable-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-docker-excluder-0:3.3.1.46.11-1.git.4.e236015.el7.noarch", "7Server-RH7-RHOSE-3.3:atomic-openshift-dockerregistry-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-excluder-0:3.3.1.46.11-1.git.4.e236015.el7.noarch", "7Server-RH7-RHOSE-3.3:atomic-openshift-master-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-node-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-pod-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-sdn-ovs-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-tests-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:tuned-profiles-atomic-openshift-node-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-0:3.4.1.44.38-1.git.4.bb8df08.el7.src", "7Server-RH7-RHOSE-3.4:atomic-openshift-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-clients-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-clients-redistributable-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-docker-excluder-0:3.4.1.44.38-1.git.4.bb8df08.el7.noarch", "7Server-RH7-RHOSE-3.4:atomic-openshift-dockerregistry-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-excluder-0:3.4.1.44.38-1.git.4.bb8df08.el7.noarch", "7Server-RH7-RHOSE-3.4:atomic-openshift-master-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-node-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-pod-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-sdn-ovs-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-tests-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:tuned-profiles-atomic-openshift-node-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-0:3.5.5.31.48-1.git.4.ff6153e.el7.src", "7Server-RH7-RHOSE-3.5:atomic-openshift-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-clients-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-clients-redistributable-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-docker-excluder-0:3.5.5.31.48-1.git.4.ff6153e.el7.noarch", "7Server-RH7-RHOSE-3.5:atomic-openshift-dockerregistry-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-excluder-0:3.5.5.31.48-1.git.4.ff6153e.el7.noarch", "7Server-RH7-RHOSE-3.5:atomic-openshift-master-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-node-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-pod-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-sdn-ovs-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-tests-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:tuned-profiles-atomic-openshift-node-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-0:3.6.173.0.96-1.git.4.e6301f8.el7.src", "7Server-RH7-RHOSE-3.6:atomic-openshift-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-clients-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-clients-redistributable-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-cluster-capacity-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-docker-excluder-0:3.6.173.0.96-1.git.4.e6301f8.el7.noarch", "7Server-RH7-RHOSE-3.6:atomic-openshift-dockerregistry-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-excluder-0:3.6.173.0.96-1.git.4.e6301f8.el7.noarch", "7Server-RH7-RHOSE-3.6:atomic-openshift-federation-services-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-master-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-node-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-pod-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-sdn-ovs-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-service-catalog-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-tests-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:tuned-profiles-atomic-openshift-node-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-0:3.7.23-1.git.5.83efd71.el7.src", "7Server-RH7-RHOSE-3.7:atomic-openshift-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-clients-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-clients-redistributable-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-cluster-capacity-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-docker-excluder-0:3.7.23-1.git.5.83efd71.el7.noarch", "7Server-RH7-RHOSE-3.7:atomic-openshift-dockerregistry-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-excluder-0:3.7.23-1.git.5.83efd71.el7.noarch", "7Server-RH7-RHOSE-3.7:atomic-openshift-federation-services-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-master-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-node-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-pod-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-sdn-ovs-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-service-catalog-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-template-service-broker-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-tests-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:tuned-profiles-atomic-openshift-node-0:3.7.23-1.git.5.83efd71.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0475" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.3:atomic-openshift-0:3.3.1.46.11-1.git.4.e236015.el7.src", "7Server-RH7-RHOSE-3.3:atomic-openshift-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-clients-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-clients-redistributable-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-docker-excluder-0:3.3.1.46.11-1.git.4.e236015.el7.noarch", "7Server-RH7-RHOSE-3.3:atomic-openshift-dockerregistry-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-excluder-0:3.3.1.46.11-1.git.4.e236015.el7.noarch", "7Server-RH7-RHOSE-3.3:atomic-openshift-master-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-node-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-pod-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-sdn-ovs-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-tests-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:tuned-profiles-atomic-openshift-node-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-0:3.4.1.44.38-1.git.4.bb8df08.el7.src", "7Server-RH7-RHOSE-3.4:atomic-openshift-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-clients-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-clients-redistributable-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-docker-excluder-0:3.4.1.44.38-1.git.4.bb8df08.el7.noarch", "7Server-RH7-RHOSE-3.4:atomic-openshift-dockerregistry-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-excluder-0:3.4.1.44.38-1.git.4.bb8df08.el7.noarch", "7Server-RH7-RHOSE-3.4:atomic-openshift-master-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-node-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-pod-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-sdn-ovs-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-tests-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:tuned-profiles-atomic-openshift-node-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-0:3.5.5.31.48-1.git.4.ff6153e.el7.src", "7Server-RH7-RHOSE-3.5:atomic-openshift-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-clients-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-clients-redistributable-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-docker-excluder-0:3.5.5.31.48-1.git.4.ff6153e.el7.noarch", "7Server-RH7-RHOSE-3.5:atomic-openshift-dockerregistry-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-excluder-0:3.5.5.31.48-1.git.4.ff6153e.el7.noarch", "7Server-RH7-RHOSE-3.5:atomic-openshift-master-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-node-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-pod-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-sdn-ovs-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-tests-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:tuned-profiles-atomic-openshift-node-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-0:3.6.173.0.96-1.git.4.e6301f8.el7.src", "7Server-RH7-RHOSE-3.6:atomic-openshift-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-clients-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-clients-redistributable-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-cluster-capacity-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-docker-excluder-0:3.6.173.0.96-1.git.4.e6301f8.el7.noarch", "7Server-RH7-RHOSE-3.6:atomic-openshift-dockerregistry-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-excluder-0:3.6.173.0.96-1.git.4.e6301f8.el7.noarch", "7Server-RH7-RHOSE-3.6:atomic-openshift-federation-services-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-master-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-node-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-pod-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-sdn-ovs-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-service-catalog-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-tests-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:tuned-profiles-atomic-openshift-node-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-0:3.7.23-1.git.5.83efd71.el7.src", "7Server-RH7-RHOSE-3.7:atomic-openshift-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-clients-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-clients-redistributable-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-cluster-capacity-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-docker-excluder-0:3.7.23-1.git.5.83efd71.el7.noarch", "7Server-RH7-RHOSE-3.7:atomic-openshift-dockerregistry-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-excluder-0:3.7.23-1.git.5.83efd71.el7.noarch", "7Server-RH7-RHOSE-3.7:atomic-openshift-federation-services-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-master-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-node-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-pod-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-sdn-ovs-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-service-catalog-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-template-service-broker-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-tests-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:tuned-profiles-atomic-openshift-node-0:3.7.23-1.git.5.83efd71.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kubernetes: Volume security can be sidestepped with innocent emptyDir and subpath" }, { "acknowledgments": [ { "names": [ "Joel Smith" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2017-1002102", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "discovery_date": "2018-03-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1551818" } ], "notes": [ { "category": "description", "text": "This vulnerability allows containers using a secret, configMap, projected, or downwardAPI volume to trigger deletion of arbitrary files and directories on the nodes where they are running. An attacker could use this flaw to delete arbitrary file or directories on node host.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubernetes: Malicious containers can delete any file from the node", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.3:atomic-openshift-0:3.3.1.46.11-1.git.4.e236015.el7.src", "7Server-RH7-RHOSE-3.3:atomic-openshift-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-clients-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-clients-redistributable-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-docker-excluder-0:3.3.1.46.11-1.git.4.e236015.el7.noarch", "7Server-RH7-RHOSE-3.3:atomic-openshift-dockerregistry-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-excluder-0:3.3.1.46.11-1.git.4.e236015.el7.noarch", "7Server-RH7-RHOSE-3.3:atomic-openshift-master-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-node-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-pod-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-sdn-ovs-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-tests-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:tuned-profiles-atomic-openshift-node-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-0:3.4.1.44.38-1.git.4.bb8df08.el7.src", "7Server-RH7-RHOSE-3.4:atomic-openshift-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-clients-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-clients-redistributable-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-docker-excluder-0:3.4.1.44.38-1.git.4.bb8df08.el7.noarch", "7Server-RH7-RHOSE-3.4:atomic-openshift-dockerregistry-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-excluder-0:3.4.1.44.38-1.git.4.bb8df08.el7.noarch", "7Server-RH7-RHOSE-3.4:atomic-openshift-master-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-node-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-pod-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-sdn-ovs-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-tests-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:tuned-profiles-atomic-openshift-node-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-0:3.5.5.31.48-1.git.4.ff6153e.el7.src", "7Server-RH7-RHOSE-3.5:atomic-openshift-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-clients-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-clients-redistributable-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-docker-excluder-0:3.5.5.31.48-1.git.4.ff6153e.el7.noarch", "7Server-RH7-RHOSE-3.5:atomic-openshift-dockerregistry-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-excluder-0:3.5.5.31.48-1.git.4.ff6153e.el7.noarch", "7Server-RH7-RHOSE-3.5:atomic-openshift-master-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-node-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-pod-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-sdn-ovs-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-tests-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:tuned-profiles-atomic-openshift-node-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-0:3.6.173.0.96-1.git.4.e6301f8.el7.src", "7Server-RH7-RHOSE-3.6:atomic-openshift-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-clients-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-clients-redistributable-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-cluster-capacity-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-docker-excluder-0:3.6.173.0.96-1.git.4.e6301f8.el7.noarch", "7Server-RH7-RHOSE-3.6:atomic-openshift-dockerregistry-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-excluder-0:3.6.173.0.96-1.git.4.e6301f8.el7.noarch", "7Server-RH7-RHOSE-3.6:atomic-openshift-federation-services-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-master-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-node-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-pod-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-sdn-ovs-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-service-catalog-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-tests-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:tuned-profiles-atomic-openshift-node-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-0:3.7.23-1.git.5.83efd71.el7.src", "7Server-RH7-RHOSE-3.7:atomic-openshift-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-clients-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-clients-redistributable-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-cluster-capacity-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-docker-excluder-0:3.7.23-1.git.5.83efd71.el7.noarch", "7Server-RH7-RHOSE-3.7:atomic-openshift-dockerregistry-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-excluder-0:3.7.23-1.git.5.83efd71.el7.noarch", "7Server-RH7-RHOSE-3.7:atomic-openshift-federation-services-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-master-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-node-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-pod-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-sdn-ovs-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-service-catalog-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-template-service-broker-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-tests-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:tuned-profiles-atomic-openshift-node-0:3.7.23-1.git.5.83efd71.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-1002102" }, { "category": "external", "summary": "RHBZ#1551818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551818" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-1002102", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1002102" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1002102", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1002102" } ], "release_date": "2018-03-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-03-12T19:40:44+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOSE-3.3:atomic-openshift-0:3.3.1.46.11-1.git.4.e236015.el7.src", "7Server-RH7-RHOSE-3.3:atomic-openshift-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-clients-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-clients-redistributable-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-docker-excluder-0:3.3.1.46.11-1.git.4.e236015.el7.noarch", "7Server-RH7-RHOSE-3.3:atomic-openshift-dockerregistry-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-excluder-0:3.3.1.46.11-1.git.4.e236015.el7.noarch", "7Server-RH7-RHOSE-3.3:atomic-openshift-master-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-node-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-pod-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-sdn-ovs-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-tests-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:tuned-profiles-atomic-openshift-node-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-0:3.4.1.44.38-1.git.4.bb8df08.el7.src", "7Server-RH7-RHOSE-3.4:atomic-openshift-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-clients-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-clients-redistributable-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-docker-excluder-0:3.4.1.44.38-1.git.4.bb8df08.el7.noarch", "7Server-RH7-RHOSE-3.4:atomic-openshift-dockerregistry-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-excluder-0:3.4.1.44.38-1.git.4.bb8df08.el7.noarch", "7Server-RH7-RHOSE-3.4:atomic-openshift-master-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-node-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-pod-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-sdn-ovs-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-tests-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:tuned-profiles-atomic-openshift-node-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-0:3.5.5.31.48-1.git.4.ff6153e.el7.src", "7Server-RH7-RHOSE-3.5:atomic-openshift-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-clients-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-clients-redistributable-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-docker-excluder-0:3.5.5.31.48-1.git.4.ff6153e.el7.noarch", "7Server-RH7-RHOSE-3.5:atomic-openshift-dockerregistry-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-excluder-0:3.5.5.31.48-1.git.4.ff6153e.el7.noarch", "7Server-RH7-RHOSE-3.5:atomic-openshift-master-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-node-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-pod-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-sdn-ovs-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-tests-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:tuned-profiles-atomic-openshift-node-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-0:3.6.173.0.96-1.git.4.e6301f8.el7.src", "7Server-RH7-RHOSE-3.6:atomic-openshift-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-clients-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-clients-redistributable-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-cluster-capacity-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-docker-excluder-0:3.6.173.0.96-1.git.4.e6301f8.el7.noarch", "7Server-RH7-RHOSE-3.6:atomic-openshift-dockerregistry-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-excluder-0:3.6.173.0.96-1.git.4.e6301f8.el7.noarch", "7Server-RH7-RHOSE-3.6:atomic-openshift-federation-services-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-master-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-node-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-pod-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-sdn-ovs-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-service-catalog-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-tests-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:tuned-profiles-atomic-openshift-node-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-0:3.7.23-1.git.5.83efd71.el7.src", "7Server-RH7-RHOSE-3.7:atomic-openshift-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-clients-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-clients-redistributable-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-cluster-capacity-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-docker-excluder-0:3.7.23-1.git.5.83efd71.el7.noarch", "7Server-RH7-RHOSE-3.7:atomic-openshift-dockerregistry-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-excluder-0:3.7.23-1.git.5.83efd71.el7.noarch", "7Server-RH7-RHOSE-3.7:atomic-openshift-federation-services-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-master-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-node-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-pod-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-sdn-ovs-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-service-catalog-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-template-service-broker-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-tests-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:tuned-profiles-atomic-openshift-node-0:3.7.23-1.git.5.83efd71.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0475" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.3:atomic-openshift-0:3.3.1.46.11-1.git.4.e236015.el7.src", "7Server-RH7-RHOSE-3.3:atomic-openshift-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-clients-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-clients-redistributable-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-docker-excluder-0:3.3.1.46.11-1.git.4.e236015.el7.noarch", "7Server-RH7-RHOSE-3.3:atomic-openshift-dockerregistry-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-excluder-0:3.3.1.46.11-1.git.4.e236015.el7.noarch", "7Server-RH7-RHOSE-3.3:atomic-openshift-master-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-node-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-pod-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-sdn-ovs-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:atomic-openshift-tests-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.3:tuned-profiles-atomic-openshift-node-0:3.3.1.46.11-1.git.4.e236015.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-0:3.4.1.44.38-1.git.4.bb8df08.el7.src", "7Server-RH7-RHOSE-3.4:atomic-openshift-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-clients-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-clients-redistributable-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-docker-excluder-0:3.4.1.44.38-1.git.4.bb8df08.el7.noarch", "7Server-RH7-RHOSE-3.4:atomic-openshift-dockerregistry-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-excluder-0:3.4.1.44.38-1.git.4.bb8df08.el7.noarch", "7Server-RH7-RHOSE-3.4:atomic-openshift-master-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-node-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-pod-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-sdn-ovs-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:atomic-openshift-tests-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.4:tuned-profiles-atomic-openshift-node-0:3.4.1.44.38-1.git.4.bb8df08.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-0:3.5.5.31.48-1.git.4.ff6153e.el7.src", "7Server-RH7-RHOSE-3.5:atomic-openshift-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-clients-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-clients-redistributable-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-docker-excluder-0:3.5.5.31.48-1.git.4.ff6153e.el7.noarch", "7Server-RH7-RHOSE-3.5:atomic-openshift-dockerregistry-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-excluder-0:3.5.5.31.48-1.git.4.ff6153e.el7.noarch", "7Server-RH7-RHOSE-3.5:atomic-openshift-master-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-node-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-pod-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-sdn-ovs-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:atomic-openshift-tests-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.5:tuned-profiles-atomic-openshift-node-0:3.5.5.31.48-1.git.4.ff6153e.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-0:3.6.173.0.96-1.git.4.e6301f8.el7.src", "7Server-RH7-RHOSE-3.6:atomic-openshift-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-clients-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-clients-redistributable-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-cluster-capacity-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-docker-excluder-0:3.6.173.0.96-1.git.4.e6301f8.el7.noarch", "7Server-RH7-RHOSE-3.6:atomic-openshift-dockerregistry-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-excluder-0:3.6.173.0.96-1.git.4.e6301f8.el7.noarch", "7Server-RH7-RHOSE-3.6:atomic-openshift-federation-services-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-master-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-node-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-pod-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-sdn-ovs-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-service-catalog-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:atomic-openshift-tests-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.6:tuned-profiles-atomic-openshift-node-0:3.6.173.0.96-1.git.4.e6301f8.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-0:3.7.23-1.git.5.83efd71.el7.src", "7Server-RH7-RHOSE-3.7:atomic-openshift-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-clients-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-clients-redistributable-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-cluster-capacity-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-docker-excluder-0:3.7.23-1.git.5.83efd71.el7.noarch", "7Server-RH7-RHOSE-3.7:atomic-openshift-dockerregistry-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-excluder-0:3.7.23-1.git.5.83efd71.el7.noarch", "7Server-RH7-RHOSE-3.7:atomic-openshift-federation-services-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-master-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-node-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-pod-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-sdn-ovs-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-service-catalog-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-template-service-broker-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:atomic-openshift-tests-0:3.7.23-1.git.5.83efd71.el7.x86_64", "7Server-RH7-RHOSE-3.7:tuned-profiles-atomic-openshift-node-0:3.7.23-1.git.5.83efd71.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kubernetes: Malicious containers can delete any file from the node" } ] }
opensuse-su-2020:0554-1
Vulnerability from csaf_opensuse
Published
2020-04-26 14:12
Modified
2020-04-26 14:12
Summary
Security update for kubernetes
Notes
Title of the patch
Security update for kubernetes
Description of the patch
This update introduces kubernetes version 1.14.1 and cri-o 1.17.1 to Leap 15.1.
Patchnames
openSUSE-2020-554
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kubernetes", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update introduces kubernetes version 1.14.1 and cri-o 1.17.1 to Leap 15.1.\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2020-554", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_0554-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2020:0554-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KLMQUDJXG7ORWF7M42NKLDUJSKHAUTS/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2020:0554-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KLMQUDJXG7ORWF7M42NKLDUJSKHAUTS/" }, { "category": "self", "summary": "SUSE Bug 1039663", "url": "https://bugzilla.suse.com/1039663" }, { "category": "self", "summary": "SUSE Bug 1042383", "url": "https://bugzilla.suse.com/1042383" }, { "category": "self", "summary": "SUSE Bug 1042387", "url": "https://bugzilla.suse.com/1042387" }, { "category": "self", "summary": "SUSE Bug 1057277", "url": "https://bugzilla.suse.com/1057277" }, { "category": "self", "summary": "SUSE Bug 1059207", "url": "https://bugzilla.suse.com/1059207" }, { "category": "self", "summary": "SUSE Bug 1061027", "url": "https://bugzilla.suse.com/1061027" }, { "category": "self", "summary": "SUSE Bug 1065972", "url": "https://bugzilla.suse.com/1065972" }, { "category": "self", "summary": "SUSE Bug 1069469", "url": "https://bugzilla.suse.com/1069469" }, { "category": "self", "summary": "SUSE Bug 1084765", "url": "https://bugzilla.suse.com/1084765" }, { "category": "self", "summary": "SUSE Bug 1084766", "url": "https://bugzilla.suse.com/1084766" }, { "category": "self", "summary": "SUSE Bug 1085009", "url": "https://bugzilla.suse.com/1085009" }, { "category": "self", "summary": "SUSE Bug 1086185", "url": "https://bugzilla.suse.com/1086185" }, { "category": "self", "summary": "SUSE Bug 1086412", "url": "https://bugzilla.suse.com/1086412" }, { "category": "self", "summary": "SUSE Bug 1095131", "url": "https://bugzilla.suse.com/1095131" }, { "category": "self", "summary": "SUSE Bug 1095154", "url": "https://bugzilla.suse.com/1095154" }, { "category": "self", "summary": "SUSE Bug 1096773", "url": "https://bugzilla.suse.com/1096773" }, { "category": "self", "summary": "SUSE Bug 1097473", "url": "https://bugzilla.suse.com/1097473" }, { "category": "self", "summary": "SUSE Bug 1100838", "url": "https://bugzilla.suse.com/1100838" }, { "category": "self", "summary": "SUSE Bug 1101010", "url": "https://bugzilla.suse.com/1101010" }, { "category": "self", "summary": "SUSE Bug 1104598", "url": "https://bugzilla.suse.com/1104598" }, { "category": "self", "summary": "SUSE Bug 1104821", "url": "https://bugzilla.suse.com/1104821" }, { "category": "self", "summary": "SUSE Bug 1112980", "url": "https://bugzilla.suse.com/1112980" }, { "category": "self", "summary": "SUSE Bug 1118897", "url": "https://bugzilla.suse.com/1118897" }, { "category": "self", "summary": "SUSE Bug 1118898", "url": "https://bugzilla.suse.com/1118898" }, { "category": "self", "summary": "SUSE Bug 1136403", "url": "https://bugzilla.suse.com/1136403" }, { "category": "self", "summary": "SUSE Bug 1144065", "url": "https://bugzilla.suse.com/1144065" }, { "category": "self", "summary": "SUSE Bug 1155323", "url": "https://bugzilla.suse.com/1155323" }, { "category": "self", "summary": "SUSE Bug 1161056", "url": "https://bugzilla.suse.com/1161056" }, { "category": "self", "summary": "SUSE Bug 1161179", "url": "https://bugzilla.suse.com/1161179" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8859 page", "url": "https://www.suse.com/security/cve/CVE-2016-8859/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1002101 page", "url": "https://www.suse.com/security/cve/CVE-2017-1002101/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1002105 page", "url": "https://www.suse.com/security/cve/CVE-2018-1002105/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16873 page", "url": "https://www.suse.com/security/cve/CVE-2018-16873/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16874 page", "url": "https://www.suse.com/security/cve/CVE-2018-16874/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10214 page", "url": "https://www.suse.com/security/cve/CVE-2019-10214/" } ], "title": "Security update for kubernetes", "tracking": { "current_release_date": "2020-04-26T14:12:22Z", "generator": { "date": "2020-04-26T14:12:22Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2020:0554-1", "initial_release_date": "2020-04-26T14:12:22Z", "revision_history": [ { "date": "2020-04-26T14:12:22Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cri-o-1.17.1-lp151.2.2.x86_64", "product": { "name": "cri-o-1.17.1-lp151.2.2.x86_64", "product_id": "cri-o-1.17.1-lp151.2.2.x86_64" } }, { "category": "product_version", "name": "cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "product": { "name": "cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "product_id": "cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64" } }, { "category": "product_version", "name": "cri-tools-1.18.0-lp151.2.1.x86_64", "product": { "name": "cri-tools-1.18.0-lp151.2.1.x86_64", "product_id": "cri-tools-1.18.0-lp151.2.1.x86_64" } }, { "category": "product_version", "name": "go1.14-1.14-lp151.6.1.x86_64", "product": { "name": "go1.14-1.14-lp151.6.1.x86_64", "product_id": "go1.14-1.14-lp151.6.1.x86_64" } }, { "category": "product_version", "name": "go1.14-doc-1.14-lp151.6.1.x86_64", "product": { "name": "go1.14-doc-1.14-lp151.6.1.x86_64", "product_id": "go1.14-doc-1.14-lp151.6.1.x86_64" } }, { "category": "product_version", "name": "go1.14-race-1.14-lp151.6.1.x86_64", "product": { "name": "go1.14-race-1.14-lp151.6.1.x86_64", "product_id": "go1.14-race-1.14-lp151.6.1.x86_64" } }, { "category": "product_version", "name": "kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "product": { "name": "kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "product_id": "kubernetes-apiserver-1.18.0-lp151.5.1.x86_64" } }, { "category": "product_version", "name": "kubernetes-client-1.18.0-lp151.5.1.x86_64", "product": { "name": "kubernetes-client-1.18.0-lp151.5.1.x86_64", "product_id": "kubernetes-client-1.18.0-lp151.5.1.x86_64" } }, { "category": "product_version", "name": "kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "product": { "name": "kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "product_id": "kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64" } }, { "category": "product_version", "name": "kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "product": { "name": "kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "product_id": "kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64" } }, { "category": "product_version", "name": "kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "product": { "name": "kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "product_id": "kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64" } }, { "category": "product_version", "name": "kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "product": { "name": "kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "product_id": "kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64" } }, { "category": "product_version", "name": "kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "product": { "name": "kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "product_id": "kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64" } }, { "category": "product_version", "name": "kubernetes-master-1.18.0-lp151.5.1.x86_64", "product": { "name": "kubernetes-master-1.18.0-lp151.5.1.x86_64", "product_id": "kubernetes-master-1.18.0-lp151.5.1.x86_64" } }, { "category": "product_version", "name": "kubernetes-node-1.18.0-lp151.5.1.x86_64", "product": { "name": "kubernetes-node-1.18.0-lp151.5.1.x86_64", "product_id": "kubernetes-node-1.18.0-lp151.5.1.x86_64" } }, { "category": "product_version", "name": "kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "product": { "name": "kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "product_id": "kubernetes-proxy-1.18.0-lp151.5.1.x86_64" } }, { "category": "product_version", "name": "kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", "product": { "name": "kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", "product_id": "kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cri-o-1.17.1-lp151.2.2.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64" }, "product_reference": "cri-o-1.17.1-lp151.2.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64" }, "product_reference": "cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-1.18.0-lp151.2.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64" }, "product_reference": "cri-tools-1.18.0-lp151.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.14-1.14-lp151.6.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64" }, "product_reference": "go1.14-1.14-lp151.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.14-doc-1.14-lp151.6.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64" }, "product_reference": "go1.14-doc-1.14-lp151.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.14-race-1.14-lp151.6.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64" }, "product_reference": "go1.14-race-1.14-lp151.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-apiserver-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64" }, "product_reference": "kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-client-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64" }, "product_reference": "kubernetes-client-1.18.0-lp151.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64" }, "product_reference": "kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64" }, "product_reference": "kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64" }, "product_reference": "kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64" }, "product_reference": "kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64" }, "product_reference": "kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-master-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64" }, "product_reference": "kubernetes-master-1.18.0-lp151.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-node-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64" }, "product_reference": "kubernetes-node-1.18.0-lp151.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-proxy-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64" }, "product_reference": "kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-scheduler-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" }, "product_reference": "kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-26T14:12:22Z", "details": "important" } ], "title": "CVE-2016-5195" }, { "cve": "CVE-2016-8859", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8859" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in the TRE library and musl libc allow attackers to cause memory corruption via a large number of (1) states or (2) tags, which triggers an out-of-bounds write.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8859", "url": "https://www.suse.com/security/cve/CVE-2016-8859" }, { "category": "external", "summary": "SUSE Bug 1005483 for CVE-2016-8859", "url": "https://bugzilla.suse.com/1005483" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-26T14:12:22Z", "details": "critical" } ], "title": "CVE-2016-8859" }, { "cve": "CVE-2017-1002101", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1002101" } ], "notes": [ { "category": "general", "text": "In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host\u0027s filesystem.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1002101", "url": "https://www.suse.com/security/cve/CVE-2017-1002101" }, { "category": "external", "summary": "SUSE Bug 1084923 for CVE-2017-1002101", "url": "https://bugzilla.suse.com/1084923" }, { "category": "external", "summary": "SUSE Bug 1085007 for CVE-2017-1002101", "url": "https://bugzilla.suse.com/1085007" }, { "category": "external", "summary": "SUSE Bug 1085009 for CVE-2017-1002101", "url": "https://bugzilla.suse.com/1085009" }, { "category": "external", "summary": "SUSE Bug 1096726 for CVE-2017-1002101", "url": "https://bugzilla.suse.com/1096726" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-26T14:12:22Z", "details": "important" } ], "title": "CVE-2017-1002101" }, { "cve": "CVE-2018-1002105", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1002105" } ], "notes": [ { "category": "general", "text": "In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connection directly to the backend, authenticated with the Kubernetes API server\u0027s TLS credentials used to establish the backend connection.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1002105", "url": "https://www.suse.com/security/cve/CVE-2018-1002105" }, { "category": "external", "summary": "SUSE Bug 1118198 for CVE-2018-1002105", "url": "https://bugzilla.suse.com/1118198" }, { "category": "external", "summary": "SUSE Bug 1118260 for CVE-2018-1002105", "url": "https://bugzilla.suse.com/1118260" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-26T14:12:22Z", "details": "critical" } ], "title": "CVE-2018-1002105" }, { "cve": "CVE-2018-16873", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16873" } ], "notes": [ { "category": "general", "text": "In Go before 1.10.6 and 1.11.x before 1.11.3, the \"go get\" command is vulnerable to remote code execution when executed with the -u flag and the import path of a malicious Go package, or a package that imports it directly or indirectly. Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). Using custom domains, it\u0027s possible to arrange things so that a Git repository is cloned to a folder named \".git\" by using a vanity import path that ends with \"/.git\". If the Git repository root contains a \"HEAD\" file, a \"config\" file, an \"objects\" directory, a \"refs\" directory, with some work to ensure the proper ordering of operations, \"go get -u\" can be tricked into considering the parent directory as a repository root, and running Git commands on it. That will use the \"config\" file in the original Git repository root for its configuration, and if that config file contains malicious commands, they will execute on the system running \"go get -u\".", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16873", "url": "https://www.suse.com/security/cve/CVE-2018-16873" }, { "category": "external", "summary": "SUSE Bug 1118897 for CVE-2018-16873", "url": "https://bugzilla.suse.com/1118897" }, { "category": "external", "summary": "SUSE Bug 1118898 for CVE-2018-16873", "url": "https://bugzilla.suse.com/1118898" }, { "category": "external", "summary": "SUSE Bug 1118899 for CVE-2018-16873", "url": "https://bugzilla.suse.com/1118899" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-26T14:12:22Z", "details": "important" } ], "title": "CVE-2018-16873" }, { "cve": "CVE-2018-16874", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16874" } ], "notes": [ { "category": "general", "text": "In Go before 1.10.6 and 1.11.x before 1.11.3, the \"go get\" command is vulnerable to directory traversal when executed with the import path of a malicious Go package which contains curly braces (both \u0027{\u0027 and \u0027}\u0027 characters). Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). The attacker can cause an arbitrary filesystem write, which can lead to code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16874", "url": "https://www.suse.com/security/cve/CVE-2018-16874" }, { "category": "external", "summary": "SUSE Bug 1118897 for CVE-2018-16874", "url": "https://bugzilla.suse.com/1118897" }, { "category": "external", "summary": "SUSE Bug 1118898 for CVE-2018-16874", "url": "https://bugzilla.suse.com/1118898" }, { "category": "external", "summary": "SUSE Bug 1118899 for CVE-2018-16874", "url": "https://bugzilla.suse.com/1118899" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-26T14:12:22Z", "details": "moderate" } ], "title": "CVE-2018-16874" }, { "cve": "CVE-2019-10214", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10214" } ], "notes": [ { "category": "general", "text": "The containers/image library used by the container tools Podman, Buildah, and Skopeo in Red Hat Enterprise Linux version 8 and CRI-O in OpenShift Container Platform, does not enforce TLS connections to the container registry authorization service. An attacker could use this vulnerability to launch a MiTM attack and steal login credentials or bearer tokens.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10214", "url": "https://www.suse.com/security/cve/CVE-2019-10214" }, { "category": "external", "summary": "SUSE Bug 1144065 for CVE-2019-10214", "url": "https://bugzilla.suse.com/1144065" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-26T14:12:22Z", "details": "moderate" } ], "title": "CVE-2019-10214" } ] }
opensuse-su-2024:10901-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
kubernetes-apiserver-1.22.2-21.2 on GA media
Notes
Title of the patch
kubernetes-apiserver-1.22.2-21.2 on GA media
Description of the patch
These are all security issues fixed in the kubernetes-apiserver-1.22.2-21.2 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10901
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "kubernetes-apiserver-1.22.2-21.2 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the kubernetes-apiserver-1.22.2-21.2 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10901", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10901-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8859 page", "url": "https://www.suse.com/security/cve/CVE-2016-8859/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1002101 page", "url": "https://www.suse.com/security/cve/CVE-2017-1002101/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1002105 page", "url": "https://www.suse.com/security/cve/CVE-2018-1002105/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11247 page", "url": "https://www.suse.com/security/cve/CVE-2019-11247/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11249 page", "url": "https://www.suse.com/security/cve/CVE-2019-11249/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11253 page", "url": "https://www.suse.com/security/cve/CVE-2019-11253/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9512 page", "url": "https://www.suse.com/security/cve/CVE-2019-9512/" } ], "title": "kubernetes-apiserver-1.22.2-21.2 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10901-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kubernetes-apiserver-1.22.2-21.2.aarch64", "product": { "name": "kubernetes-apiserver-1.22.2-21.2.aarch64", "product_id": "kubernetes-apiserver-1.22.2-21.2.aarch64" } }, { "category": "product_version", "name": "kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "product": { "name": "kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "product_id": "kubernetes-apiserver-minus1-1.21.5-21.2.aarch64" } }, { "category": "product_version", "name": "kubernetes-client-1.22.2-21.2.aarch64", "product": { "name": "kubernetes-client-1.22.2-21.2.aarch64", "product_id": "kubernetes-client-1.22.2-21.2.aarch64" } }, { "category": "product_version", "name": "kubernetes-controller-manager-1.22.2-21.2.aarch64", "product": { "name": "kubernetes-controller-manager-1.22.2-21.2.aarch64", "product_id": "kubernetes-controller-manager-1.22.2-21.2.aarch64" } }, { "category": "product_version", "name": "kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "product": { "name": "kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "product_id": "kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64" } }, { "category": "product_version", "name": "kubernetes-coredns-1.8.4-21.2.aarch64", "product": { "name": "kubernetes-coredns-1.8.4-21.2.aarch64", "product_id": "kubernetes-coredns-1.8.4-21.2.aarch64" } }, { "category": "product_version", "name": "kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "product": { "name": "kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "product_id": "kubernetes-coredns-minus1-1.8.0-21.2.aarch64" } }, { "category": "product_version", "name": "kubernetes-etcd-3.5.0-21.2.aarch64", "product": { "name": "kubernetes-etcd-3.5.0-21.2.aarch64", "product_id": "kubernetes-etcd-3.5.0-21.2.aarch64" } }, { "category": "product_version", "name": "kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "product": { "name": "kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "product_id": "kubernetes-etcd-minus1-3.4.13-21.2.aarch64" } }, { "category": "product_version", "name": "kubernetes-kubeadm-1.22.2-21.2.aarch64", "product": { "name": "kubernetes-kubeadm-1.22.2-21.2.aarch64", "product_id": "kubernetes-kubeadm-1.22.2-21.2.aarch64" } }, { "category": "product_version", "name": "kubernetes-kubelet-1.22.2-21.2.aarch64", "product": { "name": "kubernetes-kubelet-1.22.2-21.2.aarch64", "product_id": "kubernetes-kubelet-1.22.2-21.2.aarch64" } }, { "category": "product_version", "name": "kubernetes-proxy-1.22.2-21.2.aarch64", "product": { "name": "kubernetes-proxy-1.22.2-21.2.aarch64", "product_id": "kubernetes-proxy-1.22.2-21.2.aarch64" } }, { "category": "product_version", "name": "kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "product": { "name": "kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "product_id": "kubernetes-proxy-minus1-1.21.5-21.2.aarch64" } }, { "category": "product_version", "name": "kubernetes-scheduler-1.22.2-21.2.aarch64", "product": { "name": "kubernetes-scheduler-1.22.2-21.2.aarch64", "product_id": "kubernetes-scheduler-1.22.2-21.2.aarch64" } }, { "category": "product_version", "name": "kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "product": { "name": "kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "product_id": "kubernetes-scheduler-minus1-1.21.5-21.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kubernetes-apiserver-1.22.2-21.2.ppc64le", "product": { "name": "kubernetes-apiserver-1.22.2-21.2.ppc64le", "product_id": "kubernetes-apiserver-1.22.2-21.2.ppc64le" } }, { "category": "product_version", "name": "kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "product": { "name": "kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "product_id": "kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le" } }, { "category": "product_version", "name": "kubernetes-client-1.22.2-21.2.ppc64le", "product": { "name": "kubernetes-client-1.22.2-21.2.ppc64le", "product_id": "kubernetes-client-1.22.2-21.2.ppc64le" } }, { "category": "product_version", "name": "kubernetes-controller-manager-1.22.2-21.2.ppc64le", "product": { "name": "kubernetes-controller-manager-1.22.2-21.2.ppc64le", "product_id": "kubernetes-controller-manager-1.22.2-21.2.ppc64le" } }, { "category": "product_version", "name": "kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "product": { "name": "kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "product_id": "kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le" } }, { "category": "product_version", "name": "kubernetes-coredns-1.8.4-21.2.ppc64le", "product": { "name": "kubernetes-coredns-1.8.4-21.2.ppc64le", "product_id": "kubernetes-coredns-1.8.4-21.2.ppc64le" } }, { "category": "product_version", "name": "kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "product": { "name": "kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "product_id": "kubernetes-coredns-minus1-1.8.0-21.2.ppc64le" } }, { "category": "product_version", "name": "kubernetes-etcd-3.5.0-21.2.ppc64le", "product": { "name": "kubernetes-etcd-3.5.0-21.2.ppc64le", "product_id": "kubernetes-etcd-3.5.0-21.2.ppc64le" } }, { "category": "product_version", "name": "kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "product": { "name": "kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "product_id": "kubernetes-etcd-minus1-3.4.13-21.2.ppc64le" } }, { "category": "product_version", "name": "kubernetes-kubeadm-1.22.2-21.2.ppc64le", "product": { "name": "kubernetes-kubeadm-1.22.2-21.2.ppc64le", "product_id": "kubernetes-kubeadm-1.22.2-21.2.ppc64le" } }, { "category": "product_version", "name": "kubernetes-kubelet-1.22.2-21.2.ppc64le", "product": { "name": "kubernetes-kubelet-1.22.2-21.2.ppc64le", "product_id": "kubernetes-kubelet-1.22.2-21.2.ppc64le" } }, { "category": "product_version", "name": "kubernetes-proxy-1.22.2-21.2.ppc64le", "product": { "name": "kubernetes-proxy-1.22.2-21.2.ppc64le", "product_id": "kubernetes-proxy-1.22.2-21.2.ppc64le" } }, { "category": "product_version", "name": "kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "product": { "name": "kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "product_id": "kubernetes-proxy-minus1-1.21.5-21.2.ppc64le" } }, { "category": "product_version", "name": "kubernetes-scheduler-1.22.2-21.2.ppc64le", "product": { "name": "kubernetes-scheduler-1.22.2-21.2.ppc64le", "product_id": "kubernetes-scheduler-1.22.2-21.2.ppc64le" } }, { "category": "product_version", "name": "kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "product": { "name": "kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "product_id": "kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kubernetes-apiserver-1.22.2-21.2.s390x", "product": { "name": "kubernetes-apiserver-1.22.2-21.2.s390x", "product_id": "kubernetes-apiserver-1.22.2-21.2.s390x" } }, { "category": "product_version", "name": "kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "product": { "name": "kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "product_id": "kubernetes-apiserver-minus1-1.21.5-21.2.s390x" } }, { "category": "product_version", "name": "kubernetes-client-1.22.2-21.2.s390x", "product": { "name": "kubernetes-client-1.22.2-21.2.s390x", "product_id": "kubernetes-client-1.22.2-21.2.s390x" } }, { "category": "product_version", "name": "kubernetes-controller-manager-1.22.2-21.2.s390x", "product": { "name": "kubernetes-controller-manager-1.22.2-21.2.s390x", "product_id": "kubernetes-controller-manager-1.22.2-21.2.s390x" } }, { "category": "product_version", "name": "kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "product": { "name": "kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "product_id": "kubernetes-controller-manager-minus1-1.21.5-21.2.s390x" } }, { "category": "product_version", "name": "kubernetes-coredns-1.8.4-21.2.s390x", "product": { "name": "kubernetes-coredns-1.8.4-21.2.s390x", "product_id": "kubernetes-coredns-1.8.4-21.2.s390x" } }, { "category": "product_version", "name": "kubernetes-coredns-minus1-1.8.0-21.2.s390x", "product": { "name": "kubernetes-coredns-minus1-1.8.0-21.2.s390x", "product_id": "kubernetes-coredns-minus1-1.8.0-21.2.s390x" } }, { "category": "product_version", "name": "kubernetes-etcd-3.5.0-21.2.s390x", "product": { "name": "kubernetes-etcd-3.5.0-21.2.s390x", "product_id": "kubernetes-etcd-3.5.0-21.2.s390x" } }, { "category": "product_version", "name": "kubernetes-etcd-minus1-3.4.13-21.2.s390x", "product": { "name": "kubernetes-etcd-minus1-3.4.13-21.2.s390x", "product_id": "kubernetes-etcd-minus1-3.4.13-21.2.s390x" } }, { "category": "product_version", "name": "kubernetes-kubeadm-1.22.2-21.2.s390x", "product": { "name": "kubernetes-kubeadm-1.22.2-21.2.s390x", "product_id": "kubernetes-kubeadm-1.22.2-21.2.s390x" } }, { "category": "product_version", "name": "kubernetes-kubelet-1.22.2-21.2.s390x", "product": { "name": "kubernetes-kubelet-1.22.2-21.2.s390x", "product_id": "kubernetes-kubelet-1.22.2-21.2.s390x" } }, { "category": "product_version", "name": "kubernetes-proxy-1.22.2-21.2.s390x", "product": { "name": "kubernetes-proxy-1.22.2-21.2.s390x", "product_id": "kubernetes-proxy-1.22.2-21.2.s390x" } }, { "category": "product_version", "name": "kubernetes-proxy-minus1-1.21.5-21.2.s390x", "product": { "name": "kubernetes-proxy-minus1-1.21.5-21.2.s390x", "product_id": "kubernetes-proxy-minus1-1.21.5-21.2.s390x" } }, { "category": "product_version", "name": "kubernetes-scheduler-1.22.2-21.2.s390x", "product": { "name": "kubernetes-scheduler-1.22.2-21.2.s390x", "product_id": "kubernetes-scheduler-1.22.2-21.2.s390x" } }, { "category": "product_version", "name": "kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "product": { "name": "kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "product_id": "kubernetes-scheduler-minus1-1.21.5-21.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kubernetes-apiserver-1.22.2-21.2.x86_64", "product": { "name": "kubernetes-apiserver-1.22.2-21.2.x86_64", "product_id": "kubernetes-apiserver-1.22.2-21.2.x86_64" } }, { "category": "product_version", "name": "kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "product": { "name": "kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "product_id": "kubernetes-apiserver-minus1-1.21.5-21.2.x86_64" } }, { "category": "product_version", "name": "kubernetes-client-1.22.2-21.2.x86_64", "product": { "name": "kubernetes-client-1.22.2-21.2.x86_64", "product_id": "kubernetes-client-1.22.2-21.2.x86_64" } }, { "category": "product_version", "name": "kubernetes-controller-manager-1.22.2-21.2.x86_64", "product": { "name": "kubernetes-controller-manager-1.22.2-21.2.x86_64", "product_id": "kubernetes-controller-manager-1.22.2-21.2.x86_64" } }, { "category": "product_version", "name": "kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "product": { "name": "kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "product_id": "kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64" } }, { "category": "product_version", "name": "kubernetes-coredns-1.8.4-21.2.x86_64", "product": { "name": "kubernetes-coredns-1.8.4-21.2.x86_64", "product_id": "kubernetes-coredns-1.8.4-21.2.x86_64" } }, { "category": "product_version", "name": "kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "product": { "name": "kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "product_id": "kubernetes-coredns-minus1-1.8.0-21.2.x86_64" } }, { "category": "product_version", "name": "kubernetes-etcd-3.5.0-21.2.x86_64", "product": { "name": "kubernetes-etcd-3.5.0-21.2.x86_64", "product_id": "kubernetes-etcd-3.5.0-21.2.x86_64" } }, { "category": "product_version", "name": "kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "product": { "name": "kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "product_id": "kubernetes-etcd-minus1-3.4.13-21.2.x86_64" } }, { "category": "product_version", "name": "kubernetes-kubeadm-1.22.2-21.2.x86_64", "product": { "name": "kubernetes-kubeadm-1.22.2-21.2.x86_64", "product_id": "kubernetes-kubeadm-1.22.2-21.2.x86_64" } }, { "category": "product_version", "name": "kubernetes-kubelet-1.22.2-21.2.x86_64", "product": { "name": "kubernetes-kubelet-1.22.2-21.2.x86_64", "product_id": "kubernetes-kubelet-1.22.2-21.2.x86_64" } }, { "category": "product_version", "name": "kubernetes-proxy-1.22.2-21.2.x86_64", "product": { "name": "kubernetes-proxy-1.22.2-21.2.x86_64", "product_id": "kubernetes-proxy-1.22.2-21.2.x86_64" } }, { "category": "product_version", "name": "kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "product": { "name": "kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "product_id": "kubernetes-proxy-minus1-1.21.5-21.2.x86_64" } }, { "category": "product_version", "name": "kubernetes-scheduler-1.22.2-21.2.x86_64", "product": { "name": "kubernetes-scheduler-1.22.2-21.2.x86_64", "product_id": "kubernetes-scheduler-1.22.2-21.2.x86_64" } }, { "category": "product_version", "name": "kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", "product": { "name": "kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", "product_id": "kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kubernetes-apiserver-1.22.2-21.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64" }, "product_reference": "kubernetes-apiserver-1.22.2-21.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-apiserver-1.22.2-21.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le" }, "product_reference": "kubernetes-apiserver-1.22.2-21.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-apiserver-1.22.2-21.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x" }, "product_reference": "kubernetes-apiserver-1.22.2-21.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-apiserver-1.22.2-21.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64" }, "product_reference": "kubernetes-apiserver-1.22.2-21.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-apiserver-minus1-1.21.5-21.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64" }, "product_reference": "kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le" }, "product_reference": "kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-apiserver-minus1-1.21.5-21.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x" }, "product_reference": "kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-apiserver-minus1-1.21.5-21.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64" }, "product_reference": "kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-client-1.22.2-21.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64" }, "product_reference": "kubernetes-client-1.22.2-21.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-client-1.22.2-21.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le" }, "product_reference": "kubernetes-client-1.22.2-21.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-client-1.22.2-21.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x" }, "product_reference": "kubernetes-client-1.22.2-21.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-client-1.22.2-21.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64" }, "product_reference": "kubernetes-client-1.22.2-21.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-controller-manager-1.22.2-21.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64" }, "product_reference": "kubernetes-controller-manager-1.22.2-21.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-controller-manager-1.22.2-21.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le" }, "product_reference": "kubernetes-controller-manager-1.22.2-21.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-controller-manager-1.22.2-21.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x" }, "product_reference": "kubernetes-controller-manager-1.22.2-21.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-controller-manager-1.22.2-21.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64" }, "product_reference": "kubernetes-controller-manager-1.22.2-21.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64" }, "product_reference": "kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le" }, "product_reference": "kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-controller-manager-minus1-1.21.5-21.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x" }, "product_reference": "kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64" }, "product_reference": "kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-coredns-1.8.4-21.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64" }, "product_reference": "kubernetes-coredns-1.8.4-21.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-coredns-1.8.4-21.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le" }, "product_reference": "kubernetes-coredns-1.8.4-21.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-coredns-1.8.4-21.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x" }, "product_reference": "kubernetes-coredns-1.8.4-21.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-coredns-1.8.4-21.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64" }, "product_reference": "kubernetes-coredns-1.8.4-21.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-coredns-minus1-1.8.0-21.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64" }, "product_reference": "kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-coredns-minus1-1.8.0-21.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le" }, "product_reference": "kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-coredns-minus1-1.8.0-21.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x" }, "product_reference": "kubernetes-coredns-minus1-1.8.0-21.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-coredns-minus1-1.8.0-21.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64" }, "product_reference": "kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-etcd-3.5.0-21.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64" }, "product_reference": "kubernetes-etcd-3.5.0-21.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-etcd-3.5.0-21.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le" }, "product_reference": "kubernetes-etcd-3.5.0-21.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-etcd-3.5.0-21.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x" }, "product_reference": "kubernetes-etcd-3.5.0-21.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-etcd-3.5.0-21.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64" }, "product_reference": "kubernetes-etcd-3.5.0-21.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-etcd-minus1-3.4.13-21.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64" }, "product_reference": "kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-etcd-minus1-3.4.13-21.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le" }, "product_reference": "kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-etcd-minus1-3.4.13-21.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x" }, "product_reference": "kubernetes-etcd-minus1-3.4.13-21.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-etcd-minus1-3.4.13-21.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64" }, "product_reference": "kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-kubeadm-1.22.2-21.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64" }, "product_reference": "kubernetes-kubeadm-1.22.2-21.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-kubeadm-1.22.2-21.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le" }, "product_reference": "kubernetes-kubeadm-1.22.2-21.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-kubeadm-1.22.2-21.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x" }, "product_reference": "kubernetes-kubeadm-1.22.2-21.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-kubeadm-1.22.2-21.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64" }, "product_reference": "kubernetes-kubeadm-1.22.2-21.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-kubelet-1.22.2-21.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64" }, "product_reference": "kubernetes-kubelet-1.22.2-21.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-kubelet-1.22.2-21.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le" }, "product_reference": "kubernetes-kubelet-1.22.2-21.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-kubelet-1.22.2-21.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x" }, "product_reference": "kubernetes-kubelet-1.22.2-21.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-kubelet-1.22.2-21.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64" }, "product_reference": "kubernetes-kubelet-1.22.2-21.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-proxy-1.22.2-21.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64" }, "product_reference": "kubernetes-proxy-1.22.2-21.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-proxy-1.22.2-21.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le" }, "product_reference": "kubernetes-proxy-1.22.2-21.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-proxy-1.22.2-21.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x" }, "product_reference": "kubernetes-proxy-1.22.2-21.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-proxy-1.22.2-21.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64" }, "product_reference": "kubernetes-proxy-1.22.2-21.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-proxy-minus1-1.21.5-21.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64" }, "product_reference": "kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-proxy-minus1-1.21.5-21.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le" }, "product_reference": "kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-proxy-minus1-1.21.5-21.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x" }, "product_reference": "kubernetes-proxy-minus1-1.21.5-21.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-proxy-minus1-1.21.5-21.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64" }, "product_reference": "kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-scheduler-1.22.2-21.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64" }, "product_reference": "kubernetes-scheduler-1.22.2-21.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-scheduler-1.22.2-21.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le" }, "product_reference": "kubernetes-scheduler-1.22.2-21.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-scheduler-1.22.2-21.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x" }, "product_reference": "kubernetes-scheduler-1.22.2-21.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-scheduler-1.22.2-21.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64" }, "product_reference": "kubernetes-scheduler-1.22.2-21.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-scheduler-minus1-1.21.5-21.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64" }, "product_reference": "kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le" }, "product_reference": "kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-scheduler-minus1-1.21.5-21.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x" }, "product_reference": "kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-scheduler-minus1-1.21.5-21.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" }, "product_reference": "kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5195" }, { "cve": "CVE-2016-8859", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8859" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in the TRE library and musl libc allow attackers to cause memory corruption via a large number of (1) states or (2) tags, which triggers an out-of-bounds write.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8859", "url": "https://www.suse.com/security/cve/CVE-2016-8859" }, { "category": "external", "summary": "SUSE Bug 1005483 for CVE-2016-8859", "url": "https://bugzilla.suse.com/1005483" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-8859" }, { "cve": "CVE-2017-1002101", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1002101" } ], "notes": [ { "category": "general", "text": "In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host\u0027s filesystem.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1002101", "url": "https://www.suse.com/security/cve/CVE-2017-1002101" }, { "category": "external", "summary": "SUSE Bug 1084923 for CVE-2017-1002101", "url": "https://bugzilla.suse.com/1084923" }, { "category": "external", "summary": "SUSE Bug 1085007 for CVE-2017-1002101", "url": "https://bugzilla.suse.com/1085007" }, { "category": "external", "summary": "SUSE Bug 1085009 for CVE-2017-1002101", "url": "https://bugzilla.suse.com/1085009" }, { "category": "external", "summary": "SUSE Bug 1096726 for CVE-2017-1002101", "url": "https://bugzilla.suse.com/1096726" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-1002101" }, { "cve": "CVE-2018-1002105", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1002105" } ], "notes": [ { "category": "general", "text": "In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connection directly to the backend, authenticated with the Kubernetes API server\u0027s TLS credentials used to establish the backend connection.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1002105", "url": "https://www.suse.com/security/cve/CVE-2018-1002105" }, { "category": "external", "summary": "SUSE Bug 1118198 for CVE-2018-1002105", "url": "https://bugzilla.suse.com/1118198" }, { "category": "external", "summary": "SUSE Bug 1118260 for CVE-2018-1002105", "url": "https://bugzilla.suse.com/1118260" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2018-1002105" }, { "cve": "CVE-2019-11247", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11247" } ], "notes": [ { "category": "general", "text": "The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in this manner are enforced using roles and role bindings within the namespace, meaning that a user with access only to a resource in one namespace could create, view update or delete the cluster-scoped resource (according to their namespace role privileges). Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11247", "url": "https://www.suse.com/security/cve/CVE-2019-11247" }, { "category": "external", "summary": "SUSE Bug 1142423 for CVE-2019-11247", "url": "https://bugzilla.suse.com/1142423" }, { "category": "external", "summary": "SUSE Bug 1142434 for CVE-2019-11247", "url": "https://bugzilla.suse.com/1142434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-11247" }, { "cve": "CVE-2019-11249", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11249" } ], "notes": [ { "category": "general", "text": "The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes runs tar inside the container to create a tar archive, copies it over the network, and kubectl unpacks it on the user\u0027s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user\u0027s machine when kubectl cp is called, limited only by the system permissions of the local user. Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.1, 1.2, 1.4, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11249", "url": "https://www.suse.com/security/cve/CVE-2019-11249" }, { "category": "external", "summary": "SUSE Bug 1144507 for CVE-2019-11249", "url": "https://bugzilla.suse.com/1144507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-11249" }, { "cve": "CVE-2019-11253", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11253" } ], "notes": [ { "category": "general", "text": "Improper input validation in the Kubernetes API server in versions v1.0-1.12 and versions prior to v1.13.12, v1.14.8, v1.15.5, and v1.16.2 allows authorized users to send malicious YAML or JSON payloads, causing the API server to consume excessive CPU or memory, potentially crashing and becoming unavailable. Prior to v1.14.0, default RBAC policy authorized anonymous users to submit requests that could trigger this vulnerability. Clusters upgraded from a version prior to v1.14.0 keep the more permissive policy by default for backwards compatibility.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11253", "url": "https://www.suse.com/security/cve/CVE-2019-11253" }, { "category": "external", "summary": "SUSE Bug 1152861 for CVE-2019-11253", "url": "https://bugzilla.suse.com/1152861" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-11253" }, { "cve": "CVE-2019-9512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9512" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9512", "url": "https://www.suse.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146099 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146099" }, { "category": "external", "summary": "SUSE Bug 1146111 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146111" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-9512" } ] }
fkie_cve-2017-1002101
Vulnerability from fkie_nvd
Published
2018-03-13 17:29
Modified
2024-11-21 03:04
Severity ?
8.8 (High) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
9.6 (Critical) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
9.6 (Critical) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
Summary
In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host's filesystem.
References
▶ | URL | Tags | |
---|---|---|---|
jordan@liggitt.net | http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html | ||
jordan@liggitt.net | https://access.redhat.com/errata/RHSA-2018:0475 | Third Party Advisory | |
jordan@liggitt.net | https://github.com/bgeesaman/subpath-exploit/ | Exploit, Third Party Advisory | |
jordan@liggitt.net | https://github.com/kubernetes/kubernetes/issues/60813 | Issue Tracking, Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:0475 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/bgeesaman/subpath-exploit/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/kubernetes/kubernetes/issues/60813 | Issue Tracking, Mitigation, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
kubernetes | kubernetes | * | |
kubernetes | kubernetes | * | |
kubernetes | kubernetes | * | |
kubernetes | kubernetes | * | |
kubernetes | kubernetes | * | |
kubernetes | kubernetes | * | |
kubernetes | kubernetes | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "85841C2A-31F1-4725-BE9D-0E346D133CC9", "versionEndIncluding": "1.3.10", "versionStartIncluding": "1.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CE7BB45-879A-48CE-BE8B-463CB97B8ABA", "versionEndIncluding": "1.4.12", "versionStartIncluding": "1.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "0990DE9E-F42A-42E5-9589-ACFCD79950E5", "versionEndIncluding": "1.5.8", "versionStartIncluding": "1.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "520D312F-37C8-4604-B4C3-D9DB8317CF9F", "versionEndIncluding": "1.6.13", "versionStartIncluding": "1.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "F39F83C4-3CC3-4681-8363-0986209D4E2B", "versionEndExcluding": "1.7.14", "versionStartIncluding": "1.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEE0979F-ED58-43D8-9E3B-7261B1782DD2", "versionEndExcluding": "1.8.9", "versionStartIncluding": "1.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4818E0C-B0ED-424F-AD73-B87777FD9D9E", "versionEndExcluding": "1.9.4", "versionStartIncluding": "1.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host\u0027s filesystem." }, { "lang": "es", "value": "En Kubernetes, en versiones 1.3.x, 1.4.x, 1.5.x, 1.6.x y en versiones anteriores a la 1.7.14, 1.8.9 y 1.9.4, los contenedores que emplean montajes de volumen subpath con cualquier tipo de volumen (incluyendo pods no privilegiados, dependientes de los permisos de archivo) pueden acceder a archivos/directorios fuera del volumen, incluyendo el sistema de archivos del host." } ], "id": "CVE-2017-1002101", "lastModified": "2024-11-21T03:04:58.560", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "jordan@liggitt.net", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 3.1, "impactScore": 5.8, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-13T17:29:00.233", "references": [ { "source": "jordan@liggitt.net", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:0475" }, { "source": "jordan@liggitt.net", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/bgeesaman/subpath-exploit/" }, { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking", "Mitigation", "Vendor Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/60813" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:0475" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/bgeesaman/subpath-exploit/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mitigation", "Vendor Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/60813" } ], "sourceIdentifier": "jordan@liggitt.net", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-59" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-rqgw-vh6p-qf7j
Vulnerability from github
Published
2022-05-13 01:38
Modified
2022-05-13 01:38
Severity ?
VLAI Severity ?
Details
In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host's filesystem.
{ "affected": [], "aliases": [ "CVE-2017-1002101" ], "database_specific": { "cwe_ids": [ "CWE-59" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-03-13T17:29:00Z", "severity": "CRITICAL" }, "details": "In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host\u0027s filesystem.", "id": "GHSA-rqgw-vh6p-qf7j", "modified": "2022-05-13T01:38:23Z", "published": "2022-05-13T01:38:23Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1002101" }, { "type": "WEB", "url": "https://github.com/kubernetes/kubernetes/issues/60813" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:0475" }, { "type": "WEB", "url": "https://github.com/bgeesaman/subpath-exploit" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…