You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
See doc/triage.md for instructions on how to triage this report.
modules:
- module: TODO
versions:
- fixed: 1.16.11
packages:
- package: k8s.io/kube-proxy
- module: TODO
versions:
- introduced: 1.17.0
fixed: 1.17.7
packages:
- package: k8s.io/kube-proxy
- module: TODO
versions:
- introduced: 1.18.0
fixed: 1.18.4
packages:
- package: k8s.io/kube-proxy
description: |-
A security issue was discovered in kube-proxy which allows adjacent hosts to reach TCP and UDP services bound to 127.0.0.1 running on the node or in the node's network namespace. For example, if a cluster administrator runs a TCP service on a node that listens on 127.0.0.1:1234, because of this bug, that service would be potentially reachable by other hosts on the same LAN as the node, or by containers running on the same node as the service. If the example service on port 1234 required no additional authentication (because it assumed that only other localhost processes could reach it), then it could be vulnerable to attacks that make use of this bug.
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8558
https://www.openwall.com/lists/oss-security/2020/07/08/1
cves:
- CVE-2020-8558
ghsas:
- GHSA-wqv3-8cm6-h6wg
The text was updated successfully, but these errors were encountered:
In GitHub Security Advisory GHSA-wqv3-8cm6-h6wg, there is a vulnerability in the following Go packages or modules:
Cross references:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: