Rapid7 Vulnerability & Exploit Database

Rocky Linux: CVE-2019-9946: container-tools-rhel8 (RLSA-2019-3403)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Rocky Linux: CVE-2019-9946: container-tools-rhel8 (RLSA-2019-3403)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
04/02/2019
Created
03/13/2024
Added
03/12/2024
Modified
03/12/2024

Description

Cloud Native Computing Foundation (CNCF) CNI (Container Networking Interface) 0.7.4 has a network firewall misconfiguration which affects Kubernetes. The CNI 'portmap' plugin, used to setup HostPorts for CNI, inserts rules at the front of the iptables nat chains; which take precedence over the KUBE- SERVICES chain. Because of this, the HostPort/portmap rule could match incoming traffic even if there were better fitting, more specific service definition rules like NodePorts later in the chain. The issue is fixed in CNI 0.7.5 and Kubernetes 1.11.9, 1.12.7, 1.13.5, and 1.14.0.

Solution(s)

  • rocky-upgrade-oci-systemd-hook
  • rocky-upgrade-oci-systemd-hook-debuginfo
  • rocky-upgrade-oci-systemd-hook-debugsource
  • rocky-upgrade-oci-umount
  • rocky-upgrade-oci-umount-debuginfo
  • rocky-upgrade-oci-umount-debugsource

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;