Bug 1784602 (CVE-2018-1002102)
Summary: | CVE-2018-1002102 kubernetes: improper validation of URL redirection in the Kubernetes API server allows an attacker-controlled Kubelet to redirect API server requests from streaming endpoints | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | bmontgom, cscribne, dominik.mierzejewski, eparis, go-sig, hchiramm, hvyas, ichavero, jbrooks, jburrell, jcajka, jchaloup, jmulligan, jokerman, madam, nstielau, puebele, rhs-bugs, security-response-team, sisharma, sponnaga, storage-qa-internal, strigazi, tstclair |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | kubernetes 1.14 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2020-12-16 16:18:35 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1804558, 1784603, 1784604, 1791520 | ||
Bug Blocks: | 1784605 |
Description
Guilherme de Almeida Suckevicz
2019-12-17 20:13:47 UTC
Created kubernetes tracking bugs for this issue: Affects: fedora-all [bug 1784603] Created kubernetes:1.10/kubernetes tracking bugs for this issue: Affects: fedora-all [bug 1784604] Kubernetes is embedded in the version of heketi shipped with Red Hat Gluster Storage 3. However, it does not use Kubernetes API server part and only uses client side bits. Fixed in OpenShift 4.1.0: https://github.com/openshift/origin/commit/efc7e25e7d1475b7c0c6caa74093cdad64d467e9 Statement: OpenShift Container Platform 4 is not affected by this flaw as it has included the upstream patch since version 4.1.0. This issue has been addressed in the following products: Red Hat OpenShift Container Platform 3.11 Via RHSA-2020:5363 https://access.redhat.com/errata/RHSA-2020:5363 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-1002102 |