|
Message-ID: <F2B8265A-672C-4667-8083-51015773475A@amazon.com> Date: Wed, 19 Apr 2023 05:45:10 +0000 From: "Vellore Rajakumar, Sri Saran Balaji" <srajakum@...zon.com> To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com> Subject: [kubernetes] CVE-2023-1174, CVE-2023-1944: Network port exposure and ssh access using default password Hello Kubernetes Community, We have released minikube v1.30.0<https://github.com/kubernetes/minikube/releases/tag/v1.30.0> to address two security issues in minikube. We recommend all to upgrade minikube to the latest version and delete any Kubernetes clusters created with an affected version. Minikube is a utility tool that sets up a Kubernetes environment on a local machine for developing and testing Kubernetes applications. Minikube is not intended for production use. CVE-2023-1174: Network port exposure This vulnerability exposes a network port in minikube running on macOS with Docker driver that could enable unexpected remote access to the minikube container. This issue has been rated CRITICAL (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H<https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H>) (score: 9.8). Am I vulnerable? This CVE only affects clusters running on macOS with Docker drivers. If you have created the Kubernetes cluster using one of the below mentioned minikube versions, then you are affected by this vulnerability. Affected Versions • v1.28.0 • v1.27.1 • v1.27.0 • v1.26.1 • v1.26.0 You can also run the following command to know if you are affected. If the command returns 0.0.0.0 then you are affected by this vulnerability. `docker inspect --format='{{(index (index .NetworkSettings.Ports "8443/tcp") 0).HostIp}}' minikube` CVE-2023-1944: SSH access using default password This vulnerability enables ssh access to minikube container using a default password. This issue has been rated HIGH (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H<https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H>) (score: 8.4). Am I vulnerable? All versions prior to v.1.30.0 are affected. To find the version deployed in your environment, run the following command - `minikube version` How do I remediate these vulnerabilities? To mitigate these vulnerabilities, you must upgrade minikube to the latest version and delete any clusters created using an affected version. Fixed Version • v1.30.0 Note: To delete clusters created using prior versions, run `minikube delete --all` Thank You, Balaji on behalf of the Kubernetes Security Response Committee
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.