Bug 1273969 - (CVE-2015-5305) CVE-2015-5305 Kubernetes: Missing name validation allows path traversal in etcd
CVE-2015-5305 Kubernetes: Missing name validation allows path traversal in etcd
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On: 1273494
Blocks: 1273971
  Show dependency treegraph
Reported: 2015-10-21 11:32 EDT by Kurt Seifried
Modified: 2015-11-05 10:18 EST (History)
12 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Kubernetes fails to validate object name types before passing the data to etcd. As the etcd service generates keys based on the object name type this can lead to a directory path traversal.
Story Points: ---
Clone Of:
Last Closed: 2015-10-27 16:30:33 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2015:1945 normal SHIPPED_LIVE Moderate: kubernetes security update 2015-10-27 18:41:38 EDT

  None (edit)
Description Kurt Seifried 2015-10-21 11:32:41 EDT
Jordan Liggitt of Red Hat reports:

No validation is performed on the names of some object types. Because the etcd 
key is built directly from the object name, this allows path traversal when 
writing data.
Comment 1 Kurt Seifried 2015-10-21 11:35:22 EDT

This issue was discovered by Jordan Liggitt of Red Hat.
Comment 2 errata-xmlrpc 2015-10-27 14:41:56 EDT
This issue has been addressed in the following products:

  RHEL 7 Version of OpenShift Enterprise 3.0

Via RHSA-2015:1945 https://access.redhat.com/errata/RHSA-2015:1945

Note You need to log in before you can comment on or make changes to this bug.