Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

x/vulndb: potential Go vuln in github.com/kubernetes/kubernetes/pkg/kubelet/server: GHSA-qhm4-jxv7-j9pq #1422

Closed
GoVulnBot opened this issue Jan 9, 2023 · 1 comment

Comments

@GoVulnBot
Copy link

In GitHub Security Advisory GHSA-qhm4-jxv7-j9pq, there is a vulnerability in the following Go packages or modules:

Unit Fixed Vulnerable Ranges
github.com/kubernetes/kubernetes/pkg/kubelet/server 1.17.2 >= 1.17.0, < 1.17.2

Cross references:

See doc/triage.md for instructions on how to triage this report.

modules:
  - module: TODO
    versions:
      - introduced: 1.17.0
        fixed: 1.17.2
    packages:
      - package: github.com/kubernetes/kubernetes/pkg/kubelet/server
  - module: TODO
    versions:
      - introduced: 1.16.0
        fixed: 1.16.6
    packages:
      - package: github.com/kubernetes/kubernetes/pkg/kubelet/server
  - module: TODO
    versions:
      - introduced: 1.15.0
        fixed: 1.15.10
    packages:
      - package: github.com/kubernetes/kubernetes/pkg/kubelet/server
description: The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2
    has been found to be vulnerable to a denial of service attack via the kubelet
    API, including the unauthenticated HTTP read-only API typically served on port
    10255, and the authenticated HTTPS API typically served on port 10250.
cves:
  - CVE-2020-8551
ghsas:
  - GHSA-qhm4-jxv7-j9pq

@tatianab
Copy link
Contributor

tatianab commented Jan 9, 2023

Duplicate of #867

# for free to join this conversation on GitHub. Already have an account? # to comment
Projects
None yet
Development

No branches or pull requests

2 participants