Bug 2058404 (CVE-2022-0759)

Summary: CVE-2022-0759 kubeclient: kubeconfig parsing error can lead to MITM attacks
Product: [Other] Security Response Reporter: Mauro Matteo Cascella <mcascell>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: bbuckingham, bcourt, bmontgom, btotty, cben, ehelms, eparis, ewolinet, jburrell, jcantril, jokerman, jsherril, jwendell, lzap, mhulan, mmccune, myarboro, nmoumoul, nstielau, orabin, ovanders, pcreech, periklis, rcernich, rchan, security-response-team, shsaxena, sponnaga, vinair, vkumar, ytale
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: kubeclient 4.9.3 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in kubeclient, the Ruby client for Kubernetes REST API, in the way it parsed kubeconfig files. When the kubeconfig file does not configure custom CA to verify certs, kubeclient ends up accepting any certificate (it wrongly returns VERIFY_NONE). Ruby applications that leverage kubeclient to parse kubeconfig files are susceptible to Man-in-the-middle attacks (MITM).
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-04-21 01:31:12 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2058656, 2067289    
Bug Blocks: 2058533    

Description Mauro Matteo Cascella 2022-02-24 20:11:52 UTC
A flaw was found in kubeclient, the Ruby client for Kubernetes REST API, in the way it parsed kubeconfig files. When the kubeconfig file does not configure custom CA to verify certs, kubeclient ends up accepting any certificate (it wrongly returns VERIFY_NONE). Ruby applications that leverage kubeclient to parse kubeconfig files are susceptible to MITM attacks.

Comment 7 Vipul Nair 2022-03-24 08:53:47 UTC
Red Hat Satellite ships affected RubyGem Kubeclient, however, the product is not vulnerable, since it does not parse KubeClient through the affected "Kubeclient::Config" code. Therefore, we are reducing product impact to low.

Comment 16 errata-xmlrpc 2022-04-20 22:57:28 UTC
This issue has been addressed in the following products:

  RHOL-5.4-RHEL-8

Via RHSA-2022:1461 https://access.redhat.com/errata/RHSA-2022:1461

Comment 17 Product Security DevOps Team 2022-04-21 01:31:09 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-0759

Comment 19 errata-xmlrpc 2022-05-11 19:52:26 UTC
This issue has been addressed in the following products:

  OpenShift Logging 5.2

Via RHSA-2022:2218 https://access.redhat.com/errata/RHSA-2022:2218

Comment 20 errata-xmlrpc 2022-05-11 20:33:35 UTC
This issue has been addressed in the following products:

  OpenShift Logging 5.3

Via RHSA-2022:2217 https://access.redhat.com/errata/RHSA-2022:2217

Comment 22 errata-xmlrpc 2022-08-18 16:04:36 UTC
This issue has been addressed in the following products:

  RHOL-5.5-RHEL-8

Via RHSA-2022:6051 https://access.redhat.com/errata/RHSA-2022:6051

Comment 23 errata-xmlrpc 2023-11-08 14:16:52 UTC
This issue has been addressed in the following products:

  Red Hat Satellite 6.14 for RHEL 8

Via RHSA-2023:6818 https://access.redhat.com/errata/RHSA-2023:6818