A potential symlink escape vulnerability was found in Kubernetes after 1.9.0-alpha. A compromised container could potentially be used to achieve code execution. Introduced by: https://github.com/kubernetes/kubernetes/commit/b1f85e2dfec6e64d8e1bc272251277df0058ab20
Acknowledgments: Name: Ariel Zelivansky (Twistlock)
heketi-8.0.0 shipped with Gluster uses Kubernetes version v1.5.5 which is too old and the vulnerable code is not present which was introduced in v1.9.0-alpha.2.
Statement: This issue affects Kubernetes starting from version 1.9. OpenShift Container Platform (OCP) versions 3.9 and later are also affected. This issue did not affect the version of Kubernetes(embedded in heketi) shipped with Red Hat Gluster Storage 3 as it does not contain the vulnerable code.
Upstream Patch: https://github.com/kubernetes/kubernetes/pull/75037
External References: https://discuss.kubernetes.io/t/announce-security-release-of-kubernetes-kubectl-potential-directory-traversal-releases-1-11-9-1-12-7-1-13-5-and-1-14-0-cve-2019-1002101/5712
Created kubernetes tracking bugs for this issue: Affects: fedora-all [bug 1693884] Created kubernetes:1.1/kubernetes tracking bugs for this issue: Affects: fedora-29 [bug 1693881] Created kubernetes:openshift-3.10/origin tracking bugs for this issue: Affects: fedora-29 [bug 1693882] Created origin tracking bugs for this issue: Affects: fedora-all [bug 1693885]