Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

x/vulndb: potential Go vuln in k8s.io/kube-proxy: GHSA-wqv3-8cm6-h6wg #1280

Closed
GoVulnBot opened this issue Jan 6, 2023 · 1 comment
Closed

Comments

@GoVulnBot
Copy link

In GitHub Security Advisory GHSA-wqv3-8cm6-h6wg, there is a vulnerability in the following Go packages or modules:

Unit Fixed Vulnerable Ranges
k8s.io/kube-proxy 1.16.11 < 1.16.11

Cross references:

See doc/triage.md for instructions on how to triage this report.

modules:
  - module: TODO
    versions:
      - fixed: 1.16.11
    packages:
      - package: k8s.io/kube-proxy
  - module: TODO
    versions:
      - introduced: 1.17.0
        fixed: 1.17.7
    packages:
      - package: k8s.io/kube-proxy
  - module: TODO
    versions:
      - introduced: 1.18.0
        fixed: 1.18.4
    packages:
      - package: k8s.io/kube-proxy
description: |-
    A security issue was discovered in kube-proxy which allows adjacent hosts to reach TCP and UDP services bound to 127.0.0.1 running on the node or in the node's network namespace. For example, if a cluster administrator runs a TCP service on a node that listens on 127.0.0.1:1234, because of this bug, that service would be potentially reachable by other hosts on the same LAN as the node, or by containers running on the same node as the service. If the example service on port 1234 required no additional authentication (because it assumed that only other localhost processes could reach it), then it could be vulnerable to attacks that make use of this bug.

    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8558
    https://www.openwall.com/lists/oss-security/2020/07/08/1
cves:
  - CVE-2020-8558
ghsas:
  - GHSA-wqv3-8cm6-h6wg

@tatianab
Copy link
Contributor

tatianab commented Jan 9, 2023

Duplicate of #885

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants