This is the first fixed release by KLTS for v1.15.12.
kube-proxycomponent was found to set the kernel parameter
ipvsmodes to allow local loopback access. An attacker may use the container sharing the host network, or bind and listen to the TCP/UDP service of the local
127.0.0.1on the cluster node to access the same LAN or adjacent node under the second layer network to obtain interface information. If your service does not set the necessary security certification, it may cause the risk of information leakage.
A program with this vulnerability may crash because of processing some messages that contain malicious
Protobuf. If the version of
Gogo Protobufyou are using is too low, this vulnerability may exist.
The node has sufficient disks, but it keeps reporting that the disk is insufficient to create a Pod.
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.