Source: kubernetes
Version: 1.7.16+dfsg-1
Severity: grave
Tags: security upstream
Forwarded: https://github.com/kubernetes/kubernetes/issues/71411

Hi,

The following vulnerability was published for kubernetes.

CVE-2018-1002105[0]:
| In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3,
| incorrect handling of error responses to proxied upgrade requests in
| the kube-apiserver allowed specially crafted requests to establish a
| connection through the Kubernetes API server to backend servers, then
| send arbitrary requests over the same connection directly to the
| backend, authenticated with the Kubernetes API server's TLS
| credentials used to establish the backend connection.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2018-1002105
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1002105
[1] https://groups.google.com/forum/#!topic/kubernetes-announce/GVllWCg6L88
[2] https://github.com/kubernetes/kubernetes/issues/71411

Regards,
Salvatore

Reply via email to