This is the first fixed release by KLTS for v1.14.10.
This vulnerability may make the
API Servervulnerable to a
DoS(Denial of Service) attack caused by successful
kube-proxycomponent was found to set the kernel parameter
ipvsmodes to allow local loopback access. An attacker may use the container sharing the host network, or bind and listen to the TCP/UDP service of the local
127.0.0.1on the cluster node to access the same LAN or adjacent node under the second layer network to obtain interface information. If your service does not set the necessary security certification, it may cause the risk of information leakage.
This is a security vulnerability of the
kube-apiservercomponent. An attacker can intercept certain upgrade requests sent to the node
kubelet, and forward the request to other target nodes through the original access credentials in the request that could allow an attacker to escalate privileges from a node compromise to a full cluster compromise.
A program with this vulnerability may crash because of processing some messages that contain malicious
Protobuf. If the version of
Gogo Protobufyou are using is too low, this vulnerability may exist.
The node has sufficient disks, but it keeps reporting that the disk is insufficient to create a Pod.
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.