Google Kubernetes 输入验证错误漏洞
CNNVD-ID编号 | CNNVD-201910-1096 | CVE编号 | CVE-2019-11253 |
发布时间 | 2019-10-16 | 更新时间 | 2020-12-14 |
漏洞类型 | 输入验证错误 | 漏洞来源 | N/A |
危险等级 | 高危 | 威胁类型 | 远程 |
厂商 | N/A |
漏洞介绍
Google Kubernetes是美国谷歌(Google)公司的一套开源的Docker容器集群管理系统。该系统为容器化的应用提供资源调度、部署运行、服务发现和扩容缩容等功能。API server是其中的一个API(应用编程接口)服务器。
Google Kubernetes中的API server存在输入验证错误漏洞。该漏洞源于网络系统或产品未对输入的数据进行正确的验证。以下版本受到影响:Google Kubernetes v1.0版本至1.12版本,v1.13.12之前版本,v1.14.8之前版本,v1.15.5之前版本,1.16.2之前版本。
漏洞补丁
目前厂商已发布升级了Google Kubernetes 输入验证错误漏洞的补丁,Google Kubernetes 输入验证错误漏洞的补丁获取链接:
https://github.com/kubernetes/kubernetes/issues/83253
参考网址
来源:MLIST
链接:https://groups.google.com/forum/#!topic/kubernetes-security-announce/jk8polzSUxs
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:3905
来源:CONFIRM
链接:https://github.com/kubernetes/kubernetes/issues/83253
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:3239
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20191031-0006/
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:3811
来源:access.redhat.com
链接:https://access.redhat.com/errata/RHSA-2019:3905
来源:access.redhat.com
链接:https://access.redhat.com/errata/RHSA-2019:3239
来源:access.redhat.com
链接:https://access.redhat.com/errata/RHSA-2019:3007
来源:access.redhat.com
链接:https://access.redhat.com/errata/RHSA-2019:3132
来源:access.redhat.com
链接:https://access.redhat.com/errata/RHSA-2019:3131
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/155020/Red-Hat-Security-Advisory-2019-3239-01.html
来源:www.ibm.com
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158367/Red-Hat-Security-Advisory-2020-2870-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4368/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2283/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158364/Red-Hat-Security-Advisory-2020-2863-01.html
来源:www.ibm.com
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0533/
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1168570
来源:www.ibm.com
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/154887/Red-Hat-Security-Advisory-2019-3132-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2316/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.3900/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4004/
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1143454
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158280/Red-Hat-Security-Advisory-2020-2799-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/155394/Red-Hat-Security-Advisory-2019-3905-01.html
来源:www.ibm.com
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Kubernetes-infinite-loop-via-Json-yaml-Decoding-30640
受影响实体
暂无
信息来源
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201910-1096

评论