opensuse-su-2020:0554-1
Vulnerability from csaf_opensuse
Published
2020-04-26 14:12
Modified
2020-04-26 14:12
Summary
Security update for kubernetes

Notes

Title of the patch
Security update for kubernetes
Description of the patch
This update introduces kubernetes version 1.14.1 and cri-o 1.17.1 to Leap 15.1.
Patchnames
openSUSE-2020-554
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for kubernetes",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThis update introduces kubernetes version 1.14.1 and cri-o 1.17.1 to Leap 15.1.\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-2020-554",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_0554-1.json"
      },
      {
        "category": "self",
        "summary": "URL for openSUSE-SU-2020:0554-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KLMQUDJXG7ORWF7M42NKLDUJSKHAUTS/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for openSUSE-SU-2020:0554-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KLMQUDJXG7ORWF7M42NKLDUJSKHAUTS/"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1039663",
        "url": "https://bugzilla.suse.com/1039663"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1042383",
        "url": "https://bugzilla.suse.com/1042383"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1042387",
        "url": "https://bugzilla.suse.com/1042387"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1057277",
        "url": "https://bugzilla.suse.com/1057277"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1059207",
        "url": "https://bugzilla.suse.com/1059207"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1061027",
        "url": "https://bugzilla.suse.com/1061027"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065972",
        "url": "https://bugzilla.suse.com/1065972"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1069469",
        "url": "https://bugzilla.suse.com/1069469"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1084765",
        "url": "https://bugzilla.suse.com/1084765"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1084766",
        "url": "https://bugzilla.suse.com/1084766"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085009",
        "url": "https://bugzilla.suse.com/1085009"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086185",
        "url": "https://bugzilla.suse.com/1086185"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086412",
        "url": "https://bugzilla.suse.com/1086412"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1095131",
        "url": "https://bugzilla.suse.com/1095131"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1095154",
        "url": "https://bugzilla.suse.com/1095154"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1096773",
        "url": "https://bugzilla.suse.com/1096773"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1097473",
        "url": "https://bugzilla.suse.com/1097473"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1100838",
        "url": "https://bugzilla.suse.com/1100838"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1101010",
        "url": "https://bugzilla.suse.com/1101010"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1104598",
        "url": "https://bugzilla.suse.com/1104598"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1104821",
        "url": "https://bugzilla.suse.com/1104821"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112980",
        "url": "https://bugzilla.suse.com/1112980"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1118897",
        "url": "https://bugzilla.suse.com/1118897"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1118898",
        "url": "https://bugzilla.suse.com/1118898"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1136403",
        "url": "https://bugzilla.suse.com/1136403"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1144065",
        "url": "https://bugzilla.suse.com/1144065"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155323",
        "url": "https://bugzilla.suse.com/1155323"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161056",
        "url": "https://bugzilla.suse.com/1161056"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161179",
        "url": "https://bugzilla.suse.com/1161179"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-5195 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-5195/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-8859 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-8859/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-1002101 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-1002101/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-1002105 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-1002105/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-16873 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-16873/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-16874 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-16874/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-10214 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-10214/"
      }
    ],
    "title": "Security update for kubernetes",
    "tracking": {
      "current_release_date": "2020-04-26T14:12:22Z",
      "generator": {
        "date": "2020-04-26T14:12:22Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2020:0554-1",
      "initial_release_date": "2020-04-26T14:12:22Z",
      "revision_history": [
        {
          "date": "2020-04-26T14:12:22Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cri-o-1.17.1-lp151.2.2.x86_64",
                "product": {
                  "name": "cri-o-1.17.1-lp151.2.2.x86_64",
                  "product_id": "cri-o-1.17.1-lp151.2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64",
                "product": {
                  "name": "cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64",
                  "product_id": "cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "cri-tools-1.18.0-lp151.2.1.x86_64",
                "product": {
                  "name": "cri-tools-1.18.0-lp151.2.1.x86_64",
                  "product_id": "cri-tools-1.18.0-lp151.2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "go1.14-1.14-lp151.6.1.x86_64",
                "product": {
                  "name": "go1.14-1.14-lp151.6.1.x86_64",
                  "product_id": "go1.14-1.14-lp151.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "go1.14-doc-1.14-lp151.6.1.x86_64",
                "product": {
                  "name": "go1.14-doc-1.14-lp151.6.1.x86_64",
                  "product_id": "go1.14-doc-1.14-lp151.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "go1.14-race-1.14-lp151.6.1.x86_64",
                "product": {
                  "name": "go1.14-race-1.14-lp151.6.1.x86_64",
                  "product_id": "go1.14-race-1.14-lp151.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kubernetes-apiserver-1.18.0-lp151.5.1.x86_64",
                "product": {
                  "name": "kubernetes-apiserver-1.18.0-lp151.5.1.x86_64",
                  "product_id": "kubernetes-apiserver-1.18.0-lp151.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kubernetes-client-1.18.0-lp151.5.1.x86_64",
                "product": {
                  "name": "kubernetes-client-1.18.0-lp151.5.1.x86_64",
                  "product_id": "kubernetes-client-1.18.0-lp151.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64",
                "product": {
                  "name": "kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64",
                  "product_id": "kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64",
                "product": {
                  "name": "kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64",
                  "product_id": "kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64",
                "product": {
                  "name": "kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64",
                  "product_id": "kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64",
                "product": {
                  "name": "kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64",
                  "product_id": "kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64",
                "product": {
                  "name": "kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64",
                  "product_id": "kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kubernetes-master-1.18.0-lp151.5.1.x86_64",
                "product": {
                  "name": "kubernetes-master-1.18.0-lp151.5.1.x86_64",
                  "product_id": "kubernetes-master-1.18.0-lp151.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kubernetes-node-1.18.0-lp151.5.1.x86_64",
                "product": {
                  "name": "kubernetes-node-1.18.0-lp151.5.1.x86_64",
                  "product_id": "kubernetes-node-1.18.0-lp151.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kubernetes-proxy-1.18.0-lp151.5.1.x86_64",
                "product": {
                  "name": "kubernetes-proxy-1.18.0-lp151.5.1.x86_64",
                  "product_id": "kubernetes-proxy-1.18.0-lp151.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kubernetes-scheduler-1.18.0-lp151.5.1.x86_64",
                "product": {
                  "name": "kubernetes-scheduler-1.18.0-lp151.5.1.x86_64",
                  "product_id": "kubernetes-scheduler-1.18.0-lp151.5.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.1",
                "product": {
                  "name": "openSUSE Leap 15.1",
                  "product_id": "openSUSE Leap 15.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.1"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cri-o-1.17.1-lp151.2.2.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64"
        },
        "product_reference": "cri-o-1.17.1-lp151.2.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64"
        },
        "product_reference": "cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cri-tools-1.18.0-lp151.2.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64"
        },
        "product_reference": "cri-tools-1.18.0-lp151.2.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.14-1.14-lp151.6.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64"
        },
        "product_reference": "go1.14-1.14-lp151.6.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.14-doc-1.14-lp151.6.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64"
        },
        "product_reference": "go1.14-doc-1.14-lp151.6.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.14-race-1.14-lp151.6.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64"
        },
        "product_reference": "go1.14-race-1.14-lp151.6.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kubernetes-apiserver-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64"
        },
        "product_reference": "kubernetes-apiserver-1.18.0-lp151.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kubernetes-client-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64"
        },
        "product_reference": "kubernetes-client-1.18.0-lp151.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64"
        },
        "product_reference": "kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64"
        },
        "product_reference": "kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64"
        },
        "product_reference": "kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64"
        },
        "product_reference": "kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64"
        },
        "product_reference": "kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kubernetes-master-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64"
        },
        "product_reference": "kubernetes-master-1.18.0-lp151.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kubernetes-node-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64"
        },
        "product_reference": "kubernetes-node-1.18.0-lp151.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kubernetes-proxy-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64"
        },
        "product_reference": "kubernetes-proxy-1.18.0-lp151.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kubernetes-scheduler-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64"
        },
        "product_reference": "kubernetes-scheduler-1.18.0-lp151.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2016-5195",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-5195"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64",
          "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64",
          "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64",
          "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64",
          "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64",
          "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-5195",
          "url": "https://www.suse.com/security/cve/CVE-2016-5195"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1004418 for CVE-2016-5195",
          "url": "https://bugzilla.suse.com/1004418"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1004419 for CVE-2016-5195",
          "url": "https://bugzilla.suse.com/1004419"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1004436 for CVE-2016-5195",
          "url": "https://bugzilla.suse.com/1004436"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1006323 for CVE-2016-5195",
          "url": "https://bugzilla.suse.com/1006323"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1006695 for CVE-2016-5195",
          "url": "https://bugzilla.suse.com/1006695"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1007291 for CVE-2016-5195",
          "url": "https://bugzilla.suse.com/1007291"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1008110 for CVE-2016-5195",
          "url": "https://bugzilla.suse.com/1008110"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1030118 for CVE-2016-5195",
          "url": "https://bugzilla.suse.com/1030118"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1046453 for CVE-2016-5195",
          "url": "https://bugzilla.suse.com/1046453"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1069496 for CVE-2016-5195",
          "url": "https://bugzilla.suse.com/1069496"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1149725 for CVE-2016-5195",
          "url": "https://bugzilla.suse.com/1149725"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 870618 for CVE-2016-5195",
          "url": "https://bugzilla.suse.com/870618"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 986445 for CVE-2016-5195",
          "url": "https://bugzilla.suse.com/986445"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 998689 for CVE-2016-5195",
          "url": "https://bugzilla.suse.com/998689"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64",
            "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64",
            "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64",
            "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64",
            "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64",
            "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64",
            "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-26T14:12:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2016-5195"
    },
    {
      "cve": "CVE-2016-8859",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-8859"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Multiple integer overflows in the TRE library and musl libc allow attackers to cause memory corruption via a large number of (1) states or (2) tags, which triggers an out-of-bounds write.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64",
          "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64",
          "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64",
          "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64",
          "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64",
          "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-8859",
          "url": "https://www.suse.com/security/cve/CVE-2016-8859"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1005483 for CVE-2016-8859",
          "url": "https://bugzilla.suse.com/1005483"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64",
            "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64",
            "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64",
            "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64",
            "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64",
            "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64",
            "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-26T14:12:22Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2016-8859"
    },
    {
      "cve": "CVE-2017-1002101",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-1002101"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host\u0027s filesystem.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64",
          "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64",
          "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64",
          "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64",
          "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64",
          "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-1002101",
          "url": "https://www.suse.com/security/cve/CVE-2017-1002101"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1084923 for CVE-2017-1002101",
          "url": "https://bugzilla.suse.com/1084923"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1085007 for CVE-2017-1002101",
          "url": "https://bugzilla.suse.com/1085007"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1085009 for CVE-2017-1002101",
          "url": "https://bugzilla.suse.com/1085009"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1096726 for CVE-2017-1002101",
          "url": "https://bugzilla.suse.com/1096726"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64",
            "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64",
            "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64",
            "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64",
            "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64",
            "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64",
            "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-26T14:12:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-1002101"
    },
    {
      "cve": "CVE-2018-1002105",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-1002105"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connection directly to the backend, authenticated with the Kubernetes API server\u0027s TLS credentials used to establish the backend connection.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64",
          "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64",
          "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64",
          "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64",
          "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64",
          "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-1002105",
          "url": "https://www.suse.com/security/cve/CVE-2018-1002105"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1118198 for CVE-2018-1002105",
          "url": "https://bugzilla.suse.com/1118198"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1118260 for CVE-2018-1002105",
          "url": "https://bugzilla.suse.com/1118260"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64",
            "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64",
            "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64",
            "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64",
            "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64",
            "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64",
            "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-26T14:12:22Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2018-1002105"
    },
    {
      "cve": "CVE-2018-16873",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-16873"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In Go before 1.10.6 and 1.11.x before 1.11.3, the \"go get\" command is vulnerable to remote code execution when executed with the -u flag and the import path of a malicious Go package, or a package that imports it directly or indirectly. Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). Using custom domains, it\u0027s possible to arrange things so that a Git repository is cloned to a folder named \".git\" by using a vanity import path that ends with \"/.git\". If the Git repository root contains a \"HEAD\" file, a \"config\" file, an \"objects\" directory, a \"refs\" directory, with some work to ensure the proper ordering of operations, \"go get -u\" can be tricked into considering the parent directory as a repository root, and running Git commands on it. That will use the \"config\" file in the original Git repository root for its configuration, and if that config file contains malicious commands, they will execute on the system running \"go get -u\".",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64",
          "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64",
          "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64",
          "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64",
          "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64",
          "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-16873",
          "url": "https://www.suse.com/security/cve/CVE-2018-16873"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1118897 for CVE-2018-16873",
          "url": "https://bugzilla.suse.com/1118897"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1118898 for CVE-2018-16873",
          "url": "https://bugzilla.suse.com/1118898"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1118899 for CVE-2018-16873",
          "url": "https://bugzilla.suse.com/1118899"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64",
            "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64",
            "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64",
            "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64",
            "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64",
            "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64",
            "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-26T14:12:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2018-16873"
    },
    {
      "cve": "CVE-2018-16874",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-16874"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In Go before 1.10.6 and 1.11.x before 1.11.3, the \"go get\" command is vulnerable to directory traversal when executed with the import path of a malicious Go package which contains curly braces (both \u0027{\u0027 and \u0027}\u0027 characters). Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). The attacker can cause an arbitrary filesystem write, which can lead to code execution.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64",
          "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64",
          "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64",
          "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64",
          "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64",
          "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-16874",
          "url": "https://www.suse.com/security/cve/CVE-2018-16874"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1118897 for CVE-2018-16874",
          "url": "https://bugzilla.suse.com/1118897"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1118898 for CVE-2018-16874",
          "url": "https://bugzilla.suse.com/1118898"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1118899 for CVE-2018-16874",
          "url": "https://bugzilla.suse.com/1118899"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64",
            "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64",
            "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64",
            "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64",
            "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64",
            "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64",
            "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-26T14:12:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-16874"
    },
    {
      "cve": "CVE-2019-10214",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-10214"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The containers/image library used by the container tools Podman, Buildah, and Skopeo in Red Hat Enterprise Linux version 8 and CRI-O in OpenShift Container Platform, does not enforce TLS connections to the container registry authorization service. An attacker could use this vulnerability to launch a MiTM attack and steal login credentials or bearer tokens.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64",
          "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64",
          "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64",
          "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64",
          "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64",
          "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64",
          "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-10214",
          "url": "https://www.suse.com/security/cve/CVE-2019-10214"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1144065 for CVE-2019-10214",
          "url": "https://bugzilla.suse.com/1144065"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64",
            "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64",
            "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64",
            "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64",
            "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64",
            "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64",
            "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64",
            "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-26T14:12:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-10214"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…