Bug 1886637 (CVE-2020-8564)

Summary: CVE-2020-8564 kubernetes: Docker config secrets leaked when file is malformed and loglevel >= 4
Product: [Other] Security Response Reporter: Sam Fowler <sfowler>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: adam.kaplan, aos-bugs, bmontgom, eparis, hchiramm, hvyas, jburrell, jmulligan, jokerman, madam, maszulik, mfojtik, nstielau, puebele, rhs-bugs, security-response-team, sponnaga, storage-qa-internal, sttts, wzheng, xxia
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: kubernetes 1.19.3, kubernetes 1.18.10, kubernetes 1.17.13 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in kubernetes. In Kubernetes, if the logging level is to at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. This can occur with client tools like `kubectl`, or other components that use registry credentials in a docker config file.
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-10-27 20:21:53 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1878091, 1887306, 1887308, 1887309, 1887310, 1887311, 1889786, 1889954, 1889955, 1889956, 1889957, 1898635    
Bug Blocks: 1883756    

Description Sam Fowler 2020-10-09 01:44:23 UTC
In Kubernetes, if the logging level is to at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials.

This can occur with client tools like `kubectl`, or other components that use registry credentials in a docker config file.

Comment 2 Sam Fowler 2020-10-09 01:53:40 UTC
Upstream Fix:

https://github.com/kubernetes/kubernetes/pull/94712

Comment 3 Sam Fowler 2020-10-09 01:53:45 UTC
Acknowledgments:

Name: the Kubernetes Product Security Committee
Upstream: Nikolaos Moraitis (Red Hat)

Comment 12 errata-xmlrpc 2020-10-27 14:53:56 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.6

Via RHSA-2020:4297 https://access.redhat.com/errata/RHSA-2020:4297

Comment 13 Product Security DevOps Team 2020-10-27 20:21:53 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-8564

Comment 15 errata-xmlrpc 2020-12-14 13:50:18 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.6

Via RHSA-2020:5259 https://access.redhat.com/errata/RHSA-2020:5259

Comment 16 errata-xmlrpc 2020-12-15 20:29:16 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.5

Via RHSA-2020:5359 https://access.redhat.com/errata/RHSA-2020:5359

Comment 17 errata-xmlrpc 2021-01-25 19:43:35 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.6

Via RHSA-2021:0172 https://access.redhat.com/errata/RHSA-2021:0172

Comment 18 errata-xmlrpc 2021-01-25 20:02:55 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.6

Via RHSA-2021:0171 https://access.redhat.com/errata/RHSA-2021:0171

Comment 19 errata-xmlrpc 2021-02-03 10:11:32 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.4

Via RHSA-2021:0281 https://access.redhat.com/errata/RHSA-2021:0281

Comment 21 errata-xmlrpc 2021-08-25 15:16:48 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 3.11

Via RHSA-2021:3193 https://access.redhat.com/errata/RHSA-2021:3193