vulnerability
Oracle Linux: (CVE-2020-8555) (Multiple Advisories): kubernetes-cni-plugins kubernetes-cni kubernetes olcne security update
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:N/AC:M/Au:S/C:P/I:N/A:N) | 06/05/2020 | 06/13/2020 | 08/06/2024 |
Severity
4
CVSS
(AV:N/AC:M/Au:S/C:P/I:N/A:N)
Published
06/05/2020
Added
06/13/2020
Modified
08/06/2024
Description
The Kubernetes kube-controller-manager in versions v1.0-1.14, versions prior to v1.15.12, v1.16.9, v1.17.5, and version v1.18.0 are vulnerable to a Server Side Request Forgery (SSRF) that allows certain authorized users to leak up to 500 bytes of arbitrary information from unprotected endpoints within the master's host network (such as link-local or loopback services).
Solution(s)
oracle-linux-upgrade-grafanaoracle-linux-upgrade-kubeadmoracle-linux-upgrade-kubeadm-ha-setuporacle-linux-upgrade-kubectloracle-linux-upgrade-kubeletoracle-linux-upgrade-kubernetesoracle-linux-upgrade-kubernetes-cnioracle-linux-upgrade-kubernetes-cni-pluginsoracle-linux-upgrade-olcneoracle-linux-upgrade-olcne-agentoracle-linux-upgrade-olcne-api-serveroracle-linux-upgrade-olcne-istio-chartoracle-linux-upgrade-olcne-nginxoracle-linux-upgrade-olcne-prometheus-chartoracle-linux-upgrade-olcne-utilsoracle-linux-upgrade-olcnectl
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.