vulnerability
Red Hat OpenShift: CVE-2020-8552: kubernetes: Use of unbounded 'client' label in apiserver_request_total allows for memory exhaustion
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:N/AC:L/Au:S/C:N/I:N/A:P) | 2020-03-27 | 2020-04-02 | 2025-04-14 |
Severity
4
CVSS
(AV:N/AC:L/Au:S/C:N/I:N/A:P)
Published
2020-03-27
Added
2020-04-02
Modified
2025-04-14
Description
The Kubernetes API server component in versions prior to 1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via successful API requests.
Solution(s)
linuxrpm-upgrade-atomic-enterprise-service-cataloglinuxrpm-upgrade-atomic-openshiftlinuxrpm-upgrade-atomic-openshift-cluster-autoscalerlinuxrpm-upgrade-atomic-openshift-deschedulerlinuxrpm-upgrade-atomic-openshift-dockerregistrylinuxrpm-upgrade-atomic-openshift-metrics-serverlinuxrpm-upgrade-atomic-openshift-node-problem-detectorlinuxrpm-upgrade-atomic-openshift-service-idlerlinuxrpm-upgrade-cri-olinuxrpm-upgrade-dracutlinuxrpm-upgrade-golang-github-openshift-oauth-proxylinuxrpm-upgrade-golang-github-prometheus-alertmanagerlinuxrpm-upgrade-golang-github-prometheus-node_exporterlinuxrpm-upgrade-golang-github-prometheus-prometheuslinuxrpm-upgrade-ignitionlinuxrpm-upgrade-iptableslinuxrpm-upgrade-libnftnllinuxrpm-upgrade-machine-config-daemonlinuxrpm-upgrade-openshiftlinuxrpm-upgrade-openshift-ansiblelinuxrpm-upgrade-openshift-clientslinuxrpm-upgrade-openshift-enterprise-autoheallinuxrpm-upgrade-openshift-enterprise-cluster-capacitylinuxrpm-upgrade-openshift-kuryrlinuxrpm-upgrade-ostreelinuxrpm-upgrade-rpm-ostreelinuxrpm-upgrade-systemdlinuxrpm-upgrade-toolbox

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.