Skip to content

Commit

Permalink
CVE-2021-25741 name and description change
Browse files Browse the repository at this point in the history
  • Loading branch information
YiscahLevySilas1 committed Sep 22, 2021
1 parent c011ff1 commit 229e6d5
Show file tree
Hide file tree
Showing 4 changed files with 5 additions and 5 deletions.
4 changes: 2 additions & 2 deletions controls/symlinkexchangecanallowhostfilesystemaccess.json
Original file line number Diff line number Diff line change
@@ -1,9 +1,9 @@
{
"name": "Symlink Exchange Can Allow Host Filesystem Access (CVE-2021-25741)",
"name": "Container SubPath volume mount Can Allow Host Filesystem Access (CVE-2021-25741)",
"attributes": {
"armoBuiltin": true
},
"description": "A security issue was discovered in Kubernetes where a user may be able to create a container with subPath volume mounts to access files & directories outside of the volume, including on the host filesystem. This was affected at the following versions: v1.22.0 - v1.22.1, v1.21.0 - v1.21.4, v1.20.0 - v1.20.10, version v1.19.14 and lower.",
"description": "A user may be able to create a container with subPath volume mounts to access files & directories outside of the volume, including on the host filesystem. This was affected at the following versions: v1.22.0 - v1.22.1, v1.21.0 - v1.21.4, v1.20.0 - v1.20.10, version v1.19.14 and lower. ",
"remediation": "To mitigate this vulnerability without upgrading kubelet, you can disable the VolumeSubpath feature gate on kubelet and kube-apiserver, and remove any existing Pods making use of the feature.",
"rulesNames": [
"Symlink-Exchange-Can-Allow-Host-Filesystem-Access"
Expand Down
2 changes: 1 addition & 1 deletion frameworks/MITRE.json
Original file line number Diff line number Diff line change
Expand Up @@ -33,6 +33,6 @@
"CoreDNS poisoning",
"Data Destruction",
"Resource Hijacking",
"Symlink Exchange Can Allow Host Filesystem Access (CVE-2021-25741)"
"Container SubPath volume mount Can Allow Host Filesystem Access (CVE-2021-25741)"
]
}
2 changes: 1 addition & 1 deletion frameworks/NSAframework.json
Original file line number Diff line number Diff line change
Expand Up @@ -25,6 +25,6 @@
"Ingress and Egress blocked",
"Container hostPort",
"Network policies",
"Symlink Exchange Can Allow Host Filesystem Access (CVE-2021-25741)"
"Container SubPath volume mount Can Allow Host Filesystem Access (CVE-2021-25741)"
]
}
2 changes: 1 addition & 1 deletion rules/CVE-2021-25741/rule.metadata.json
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@
],
"ruleDependencies": [
],
"description": "A security issue was discovered in Kubernetes where a user may be able to create a container with subPath volume mounts to access files & directories outside of the volume, including on the host filesystem. This was affected at the following versions: v1.22.0 - v1.22.1, v1.21.0 - v1.21.4, v1.20.0 - v1.20.10, version v1.19.14 and lower.",
"description": "A user may be able to create a container with subPath volume mounts to access files & directories outside of the volume, including on the host filesystem. This was affected at the following versions: v1.22.0 - v1.22.1, v1.21.0 - v1.21.4, v1.20.0 - v1.20.10, version v1.19.14 and lower. ",
"remediation": "To mitigate this vulnerability without upgrading kubelet, you can disable the VolumeSubpath feature gate on kubelet and kube-apiserver, and remove any existing Pods making use of the feature.",
"ruleQuery": "armo_builtins"
}

0 comments on commit 229e6d5

Please sign in to comment.