<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Kubernetes Vulnerability Announcements - CVE Feed</title>
    <link>https://kubernetes.iodocs/reference/issues-security/official-cve-feed/</link>
    <description>Auto-refreshing official CVE feed for Kubernetes repository</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-US</language>
	<copyright>The Kubernetes Authors</copyright>
    <lastBuildDate>Mon, 14 Aug 2023 14:16:35 +0000</lastBuildDate>
    <atom:link href="https://kubernetes.io/docs/reference/issues-security/official-cve-feed/feed.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>CVE-2023-2431</title>
      <link>https://github.com/kubernetes/kubernetes/issues/118690</link>
      <pubDate>Thu, 15 Jun 2023 14:42:32 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2023-2431</guid>
      <description>Bypass of seccomp profile enforcement </description>
    </item>
    <item>
      <title>CVE-2023-2727, CVE-2023-2728</title>
      <link>https://github.com/kubernetes/kubernetes/issues/118640</link>
      <pubDate>Tue, 13 Jun 2023 14:42:06 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2023-2727, CVE-2023-2728</guid>
      <description>Bypassing policies imposed by the ImagePolicyWebhook and bypassing mountable secrets policy imposed by the ServiceAccount admission plugin</description>
    </item>
    <item>
      <title>CVE-2023-2878</title>
      <link>https://github.com/kubernetes/kubernetes/issues/118419</link>
      <pubDate>Fri, 02 Jun 2023 19:03:54 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2023-2878</guid>
      <description>secrets-store-csi-driver discloses service account tokens in logs</description>
    </item>
    <item>
      <title>CVE-2022-3294</title>
      <link>https://github.com/kubernetes/kubernetes/issues/113757</link>
      <pubDate>Tue, 08 Nov 2022 21:33:26 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2022-3294</guid>
      <description>Node address isn&amp;#39;t always verified when proxying</description>
    </item>
    <item>
      <title>CVE-2022-3162</title>
      <link>https://github.com/kubernetes/kubernetes/issues/113756</link>
      <pubDate>Tue, 08 Nov 2022 21:33:07 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2022-3162</guid>
      <description>Unauthorized read of Custom Resources</description>
    </item>
    <item>
      <title>CVE-2022-3172</title>
      <link>https://github.com/kubernetes/kubernetes/issues/112513</link>
      <pubDate>Fri, 16 Sep 2022 13:14:50 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2022-3172</guid>
      <description>Aggregated API server can cause clients to be redirected (SSRF)</description>
    </item>
    <item>
      <title>CVE-2021-25749</title>
      <link>https://github.com/kubernetes/kubernetes/issues/112192</link>
      <pubDate>Thu, 01 Sep 2022 21:02:01 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2021-25749</guid>
      <description>`runAsNonRoot` logic bypass for Windows containers</description>
    </item>
    <item>
      <title>CVE-2021-25741</title>
      <link>https://github.com/kubernetes/kubernetes/issues/104980</link>
      <pubDate>Mon, 13 Sep 2021 20:58:56 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2021-25741</guid>
      <description>Symlink Exchange Can Allow Host Filesystem Access</description>
    </item>
    <item>
      <title>CVE-2021-25737</title>
      <link>https://github.com/kubernetes/kubernetes/issues/102106</link>
      <pubDate>Tue, 18 May 2021 19:14:27 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2021-25737</guid>
      <description>Holes in EndpointSlice Validation Enable Host Network Hijack</description>
    </item>
    <item>
      <title>CVE-2021-3121</title>
      <link>https://github.com/kubernetes/kubernetes/issues/101435</link>
      <pubDate>Fri, 23 Apr 2021 18:07:32 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2021-3121</guid>
      <description>Processes may panic upon receipt of malicious protobuf messages</description>
    </item>
    <item>
      <title>CVE-2021-25735</title>
      <link>https://github.com/kubernetes/kubernetes/issues/100096</link>
      <pubDate>Wed, 10 Mar 2021 18:18:01 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2021-25735</guid>
      <description>Validating Admission Webhook does not observe some previous fields</description>
    </item>
    <item>
      <title>CVE-2020-8554</title>
      <link>https://github.com/kubernetes/kubernetes/issues/97076</link>
      <pubDate>Fri, 04 Dec 2020 20:02:15 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2020-8554</guid>
      <description>Man in the middle using LoadBalancer or ExternalIPs</description>
    </item>
    <item>
      <title>CVE-2020-8566</title>
      <link>https://github.com/kubernetes/kubernetes/issues/95624</link>
      <pubDate>Thu, 15 Oct 2020 22:07:53 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2020-8566</guid>
      <description>Ceph RBD adminSecrets exposed in logs when loglevel &amp;gt;= 4</description>
    </item>
    <item>
      <title>CVE-2020-8565</title>
      <link>https://github.com/kubernetes/kubernetes/issues/95623</link>
      <pubDate>Thu, 15 Oct 2020 22:05:32 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2020-8565</guid>
      <description>Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel &amp;gt;= 9</description>
    </item>
    <item>
      <title>CVE-2020-8564</title>
      <link>https://github.com/kubernetes/kubernetes/issues/95622</link>
      <pubDate>Thu, 15 Oct 2020 22:03:19 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2020-8564</guid>
      <description>Docker config secrets leaked when file is malformed and log level &amp;gt;= 4</description>
    </item>
    <item>
      <title>CVE-2020-8563</title>
      <link>https://github.com/kubernetes/kubernetes/issues/95621</link>
      <pubDate>Thu, 15 Oct 2020 22:00:44 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2020-8563</guid>
      <description>Secret leaks in kube-controller-manager when using vSphere provider</description>
    </item>
    <item>
      <title>CVE-2020-8557</title>
      <link>https://github.com/kubernetes/kubernetes/issues/93032</link>
      <pubDate>Mon, 13 Jul 2020 18:39:08 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2020-8557</guid>
      <description>Node disk DOS by writing to container /etc/hosts</description>
    </item>
    <item>
      <title>CVE-2020-8559</title>
      <link>https://github.com/kubernetes/kubernetes/issues/92914</link>
      <pubDate>Wed, 08 Jul 2020 17:03:16 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2020-8559</guid>
      <description>Privilege escalation from compromised node to cluster</description>
    </item>
    <item>
      <title>CVE-2020-8558</title>
      <link>https://github.com/kubernetes/kubernetes/issues/92315</link>
      <pubDate>Fri, 19 Jun 2020 18:38:58 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2020-8558</guid>
      <description>Node setting allows for neighboring hosts to bypass localhost boundary</description>
    </item>
    <item>
      <title>CVE-2020-8555</title>
      <link>https://github.com/kubernetes/kubernetes/issues/91542</link>
      <pubDate>Thu, 28 May 2020 16:13:34 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2020-8555</guid>
      <description>Half-Blind SSRF in kube-controller-manager</description>
    </item>
    <item>
      <title>CVE-2020-10749</title>
      <link>https://github.com/kubernetes/kubernetes/issues/91507</link>
      <pubDate>Wed, 27 May 2020 19:32:29 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2020-10749</guid>
      <description>IPv4 only clusters susceptible to MitM attacks via IPv6 rogue router advertisements</description>
    </item>
    <item>
      <title>CVE-2019-11254</title>
      <link>https://github.com/kubernetes/kubernetes/issues/89535</link>
      <pubDate>Thu, 26 Mar 2020 18:55:26 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2019-11254</guid>
      <description>kube-apiserver Denial of Service vulnerability from malicious YAML payloads</description>
    </item>
    <item>
      <title>CVE-2020-8552</title>
      <link>https://github.com/kubernetes/kubernetes/issues/89378</link>
      <pubDate>Mon, 23 Mar 2020 18:35:34 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2020-8552</guid>
      <description>apiserver DoS (oom)</description>
    </item>
    <item>
      <title>CVE-2020-8551</title>
      <link>https://github.com/kubernetes/kubernetes/issues/89377</link>
      <pubDate>Mon, 23 Mar 2020 18:34:40 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2020-8551</guid>
      <description>Kubelet DoS via API</description>
    </item>
    <item>
      <title>CVE-2019-11251</title>
      <link>https://github.com/kubernetes/kubernetes/issues/87773</link>
      <pubDate>Mon, 03 Feb 2020 15:12:22 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2019-11251</guid>
      <description>kubectl cp symlink vulnerability</description>
    </item>
    <item>
      <title>CVE-2018-1002102</title>
      <link>https://github.com/kubernetes/kubernetes/issues/85867</link>
      <pubDate>Tue, 03 Dec 2019 22:58:37 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2018-1002102</guid>
      <description>Unvalidated redirect</description>
    </item>
    <item>
      <title>CVE-2019-11255</title>
      <link>https://github.com/kubernetes/kubernetes/issues/85233</link>
      <pubDate>Wed, 13 Nov 2019 20:57:31 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2019-11255</guid>
      <description>CSI volume snapshot, cloning and resizing features can result in unauthorized volume data access or mutation</description>
    </item>
    <item>
      <title>CVE-2019-11253</title>
      <link>https://github.com/kubernetes/kubernetes/issues/83253</link>
      <pubDate>Fri, 27 Sep 2019 16:53:31 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2019-11253</guid>
      <description>Kubernetes API Server JSON/YAML parsing vulnerable to resource exhaustion attack</description>
    </item>
    <item>
      <title>CVE-2019-11250</title>
      <link>https://github.com/kubernetes/kubernetes/issues/81114</link>
      <pubDate>Thu, 08 Aug 2019 02:03:04 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2019-11250</guid>
      <description>Bearer tokens are revealed in logs</description>
    </item>
    <item>
      <title>CVE-2019-11248</title>
      <link>https://github.com/kubernetes/kubernetes/issues/81023</link>
      <pubDate>Tue, 06 Aug 2019 14:34:33 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2019-11248</guid>
      <description>/debug/pprof exposed on kubelet&amp;#39;s healthz port</description>
    </item>
    <item>
      <title>CVE-2019-11249</title>
      <link>https://github.com/kubernetes/kubernetes/issues/80984</link>
      <pubDate>Mon, 05 Aug 2019 12:44:23 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2019-11249</guid>
      <description>Incomplete fixes for CVE-2019-1002101 and CVE-2019-11246, kubectl cp potential directory traversal</description>
    </item>
    <item>
      <title>CVE-2019-11247</title>
      <link>https://github.com/kubernetes/kubernetes/issues/80983</link>
      <pubDate>Mon, 05 Aug 2019 12:44:08 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2019-11247</guid>
      <description>API server allows access to custom resources via wrong scope</description>
    </item>
    <item>
      <title>CVE-2019-11245</title>
      <link>https://github.com/kubernetes/kubernetes/issues/78308</link>
      <pubDate>Fri, 24 May 2019 16:14:49 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2019-11245</guid>
      <description>container uid changes to root after first restart or if image is already pulled to the node</description>
    </item>
    <item>
      <title>CVE-2019-11243</title>
      <link>https://github.com/kubernetes/kubernetes/issues/76797</link>
      <pubDate>Thu, 18 Apr 2019 21:31:53 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2019-11243</guid>
      <description>rest.AnonymousClientConfig() does not remove the serviceaccount credentials from config created by rest.InClusterConfig()</description>
    </item>
    <item>
      <title>CVE-2019-11244</title>
      <link>https://github.com/kubernetes/kubernetes/issues/76676</link>
      <pubDate>Tue, 16 Apr 2019 20:14:25 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2019-11244</guid>
      <description>`kubectl:-http-cache=&amp;lt;world-accessible dir&amp;gt;` creates world-writeable cached schema files</description>
    </item>
    <item>
      <title>CVE-2019-1002100</title>
      <link>https://github.com/kubernetes/kubernetes/issues/74534</link>
      <pubDate>Mon, 25 Feb 2019 19:39:09 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2019-1002100</guid>
      <description>json-patch requests can exhaust apiserver resources</description>
    </item>
    <item>
      <title>CVE-2018-1002105</title>
      <link>https://github.com/kubernetes/kubernetes/issues/71411</link>
      <pubDate>Mon, 26 Nov 2018 11:07:36 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2018-1002105</guid>
      <description>proxy request handling in kube-apiserver can leave vulnerable TCP connections</description>
    </item>
    <item>
      <title>CVE-2018-1002101</title>
      <link>https://github.com/kubernetes/kubernetes/issues/65750</link>
      <pubDate>Tue, 03 Jul 2018 08:06:15 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2018-1002101</guid>
      <description>smb mount security issue</description>
    </item>
    <item>
      <title>CVE-2018-1002100</title>
      <link>https://github.com/kubernetes/kubernetes/issues/61297</link>
      <pubDate>Fri, 16 Mar 2018 19:24:46 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2018-1002100</guid>
      <description>Kubectl copy doesn&amp;#39;t check for paths outside of it&amp;#39;s destination directory.</description>
    </item>
    <item>
      <title>CVE-2017-1002102</title>
      <link>https://github.com/kubernetes/kubernetes/issues/60814</link>
      <pubDate>Mon, 05 Mar 2018 20:55:20 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2017-1002102</guid>
      <description>atomic writer volume handling allows arbitrary file deletion in host filesystem</description>
    </item>
    <item>
      <title>CVE-2017-1002101</title>
      <link>https://github.com/kubernetes/kubernetes/issues/60813</link>
      <pubDate>Mon, 05 Mar 2018 20:53:58 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2017-1002101</guid>
      <description>subpath volume mount handling allows arbitrary file access in host filesystem</description>
    </item>
    <item>
      <title>CVE-2017-1002100</title>
      <link>https://github.com/kubernetes/kubernetes/issues/47611</link>
      <pubDate>Thu, 15 Jun 2017 18:59:13 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2017-1002100</guid>
      <description>Azure PV should be Private scope not Container scope</description>
    </item>
    <item>
      <title>CVE-2017-1000056</title>
      <link>https://github.com/kubernetes/kubernetes/issues/43459</link>
      <pubDate>Tue, 21 Mar 2017 15:22:29 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2017-1000056</guid>
      <description>PodSecurityPolicy admission plugin authorizes incorrectly</description>
    </item>
    </channel>
</rss>

