Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2016-8859
Vulnerability from cvelistv5
Published
2017-02-13 18:00
Modified
2024-08-06 02:35
Severity ?
EPSS score ?
Summary
Multiple integer overflows in the TRE library and musl libc allow attackers to cause memory corruption via a large number of (1) states or (2) tags, which triggers an out-of-bounds write.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T02:35:01.250Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "93795", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/93795", }, { name: "GLSA-201701-11", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-11", }, { name: "[oss-security] 20161018 CVE Request - TRE & musl libc regex integer overflows in buffer size computations", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/10/19/1", }, { name: "[oss-security] 20161029 Re: CVE Request - TRE & musl libc regex integer overflows in buffer size computations", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/10/19/10", }, { name: "openSUSE-SU-2020:0554", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html", }, { name: "GLSA-202007-43", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/202007-43", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-10-18T00:00:00", descriptions: [ { lang: "en", value: "Multiple integer overflows in the TRE library and musl libc allow attackers to cause memory corruption via a large number of (1) states or (2) tags, which triggers an out-of-bounds write.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-07-27T02:06:14", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "93795", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/93795", }, { name: "GLSA-201701-11", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-11", }, { name: "[oss-security] 20161018 CVE Request - TRE & musl libc regex integer overflows in buffer size computations", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/10/19/1", }, { name: "[oss-security] 20161029 Re: CVE Request - TRE & musl libc regex integer overflows in buffer size computations", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/10/19/10", }, { name: "openSUSE-SU-2020:0554", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html", }, { name: "GLSA-202007-43", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/202007-43", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-8859", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple integer overflows in the TRE library and musl libc allow attackers to cause memory corruption via a large number of (1) states or (2) tags, which triggers an out-of-bounds write.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "93795", refsource: "BID", url: "http://www.securityfocus.com/bid/93795", }, { name: "GLSA-201701-11", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-11", }, { name: "[oss-security] 20161018 CVE Request - TRE & musl libc regex integer overflows in buffer size computations", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/10/19/1", }, { name: "[oss-security] 20161029 Re: CVE Request - TRE & musl libc regex integer overflows in buffer size computations", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/10/19/10", }, { name: "openSUSE-SU-2020:0554", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html", }, { name: "GLSA-202007-43", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/202007-43", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2016-8859", datePublished: "2017-02-13T18:00:00", dateReserved: "2016-10-19T00:00:00", dateUpdated: "2024-08-06T02:35:01.250Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2016-8859\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-02-13T18:59:00.753\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple integer overflows in the TRE library and musl libc allow attackers to cause memory corruption via a large number of (1) states or (2) tags, which triggers an out-of-bounds write.\"},{\"lang\":\"es\",\"value\":\"Múltiples desbordamientos de enteros en la librería TRE y musl libc permiten a atacantes provocar corrupción de memoria a través de un gran número de (1) estados o (2) etiquetas, lo que desencadena una escritura fuera de límites.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:etalabs:musl:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.1.15\",\"matchCriteriaId\":\"2CB79AB4-A363-48EB-BC67-A49DA19FB41C\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/10/19/1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/10/19/10\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/93795\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://security.gentoo.org/glsa/201701-11\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/202007-43\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/10/19/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/10/19/10\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/93795\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://security.gentoo.org/glsa/201701-11\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202007-43\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", }, }
opensuse-su-2024:11475-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
agrep-0.8.0_git201402282055-5.8 on GA media
Notes
Title of the patch
agrep-0.8.0_git201402282055-5.8 on GA media
Description of the patch
These are all security issues fixed in the agrep-0.8.0_git201402282055-5.8 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11475
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "agrep-0.8.0_git201402282055-5.8 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the agrep-0.8.0_git201402282055-5.8 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-11475", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11475-1.json", }, { category: "self", summary: "SUSE CVE CVE-2016-8859 page", url: "https://www.suse.com/security/cve/CVE-2016-8859/", }, ], title: "agrep-0.8.0_git201402282055-5.8 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:11475-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "agrep-0.8.0_git201402282055-5.8.aarch64", product: { name: "agrep-0.8.0_git201402282055-5.8.aarch64", product_id: "agrep-0.8.0_git201402282055-5.8.aarch64", }, }, { category: "product_version", name: "libtre5-0.8.0_git201402282055-5.8.aarch64", product: { name: "libtre5-0.8.0_git201402282055-5.8.aarch64", product_id: "libtre5-0.8.0_git201402282055-5.8.aarch64", }, }, { category: "product_version", name: "tre-0.8.0_git201402282055-5.8.aarch64", product: { name: "tre-0.8.0_git201402282055-5.8.aarch64", product_id: "tre-0.8.0_git201402282055-5.8.aarch64", }, }, { category: "product_version", name: "tre-devel-0.8.0_git201402282055-5.8.aarch64", product: { name: "tre-devel-0.8.0_git201402282055-5.8.aarch64", product_id: "tre-devel-0.8.0_git201402282055-5.8.aarch64", }, }, { category: "product_version", name: "tre-lang-0.8.0_git201402282055-5.8.aarch64", product: { name: "tre-lang-0.8.0_git201402282055-5.8.aarch64", product_id: "tre-lang-0.8.0_git201402282055-5.8.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "agrep-0.8.0_git201402282055-5.8.ppc64le", product: { name: "agrep-0.8.0_git201402282055-5.8.ppc64le", product_id: "agrep-0.8.0_git201402282055-5.8.ppc64le", }, }, { category: "product_version", name: "libtre5-0.8.0_git201402282055-5.8.ppc64le", product: { name: "libtre5-0.8.0_git201402282055-5.8.ppc64le", product_id: "libtre5-0.8.0_git201402282055-5.8.ppc64le", }, }, { category: "product_version", name: "tre-0.8.0_git201402282055-5.8.ppc64le", product: { name: "tre-0.8.0_git201402282055-5.8.ppc64le", product_id: "tre-0.8.0_git201402282055-5.8.ppc64le", }, }, { category: "product_version", name: "tre-devel-0.8.0_git201402282055-5.8.ppc64le", product: { name: "tre-devel-0.8.0_git201402282055-5.8.ppc64le", product_id: "tre-devel-0.8.0_git201402282055-5.8.ppc64le", }, }, { category: "product_version", name: "tre-lang-0.8.0_git201402282055-5.8.ppc64le", product: { name: "tre-lang-0.8.0_git201402282055-5.8.ppc64le", product_id: "tre-lang-0.8.0_git201402282055-5.8.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "agrep-0.8.0_git201402282055-5.8.s390x", product: { name: "agrep-0.8.0_git201402282055-5.8.s390x", product_id: "agrep-0.8.0_git201402282055-5.8.s390x", }, }, { category: "product_version", name: "libtre5-0.8.0_git201402282055-5.8.s390x", product: { name: "libtre5-0.8.0_git201402282055-5.8.s390x", product_id: "libtre5-0.8.0_git201402282055-5.8.s390x", }, }, { category: "product_version", name: "tre-0.8.0_git201402282055-5.8.s390x", product: { name: "tre-0.8.0_git201402282055-5.8.s390x", product_id: "tre-0.8.0_git201402282055-5.8.s390x", }, }, { category: "product_version", name: "tre-devel-0.8.0_git201402282055-5.8.s390x", product: { name: "tre-devel-0.8.0_git201402282055-5.8.s390x", product_id: "tre-devel-0.8.0_git201402282055-5.8.s390x", }, }, { category: "product_version", name: "tre-lang-0.8.0_git201402282055-5.8.s390x", product: { name: "tre-lang-0.8.0_git201402282055-5.8.s390x", product_id: "tre-lang-0.8.0_git201402282055-5.8.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "agrep-0.8.0_git201402282055-5.8.x86_64", product: { name: "agrep-0.8.0_git201402282055-5.8.x86_64", product_id: "agrep-0.8.0_git201402282055-5.8.x86_64", }, }, { category: "product_version", name: "libtre5-0.8.0_git201402282055-5.8.x86_64", product: { name: "libtre5-0.8.0_git201402282055-5.8.x86_64", product_id: "libtre5-0.8.0_git201402282055-5.8.x86_64", }, }, { category: "product_version", name: "tre-0.8.0_git201402282055-5.8.x86_64", product: { name: "tre-0.8.0_git201402282055-5.8.x86_64", product_id: "tre-0.8.0_git201402282055-5.8.x86_64", }, }, { category: "product_version", name: "tre-devel-0.8.0_git201402282055-5.8.x86_64", product: { name: "tre-devel-0.8.0_git201402282055-5.8.x86_64", product_id: "tre-devel-0.8.0_git201402282055-5.8.x86_64", }, }, { category: "product_version", name: "tre-lang-0.8.0_git201402282055-5.8.x86_64", product: { name: "tre-lang-0.8.0_git201402282055-5.8.x86_64", product_id: "tre-lang-0.8.0_git201402282055-5.8.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "agrep-0.8.0_git201402282055-5.8.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:agrep-0.8.0_git201402282055-5.8.aarch64", }, product_reference: "agrep-0.8.0_git201402282055-5.8.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "agrep-0.8.0_git201402282055-5.8.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:agrep-0.8.0_git201402282055-5.8.ppc64le", }, product_reference: "agrep-0.8.0_git201402282055-5.8.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "agrep-0.8.0_git201402282055-5.8.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:agrep-0.8.0_git201402282055-5.8.s390x", }, product_reference: "agrep-0.8.0_git201402282055-5.8.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "agrep-0.8.0_git201402282055-5.8.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:agrep-0.8.0_git201402282055-5.8.x86_64", }, product_reference: "agrep-0.8.0_git201402282055-5.8.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtre5-0.8.0_git201402282055-5.8.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtre5-0.8.0_git201402282055-5.8.aarch64", }, product_reference: "libtre5-0.8.0_git201402282055-5.8.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtre5-0.8.0_git201402282055-5.8.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtre5-0.8.0_git201402282055-5.8.ppc64le", }, product_reference: "libtre5-0.8.0_git201402282055-5.8.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtre5-0.8.0_git201402282055-5.8.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtre5-0.8.0_git201402282055-5.8.s390x", }, product_reference: "libtre5-0.8.0_git201402282055-5.8.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtre5-0.8.0_git201402282055-5.8.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtre5-0.8.0_git201402282055-5.8.x86_64", }, product_reference: "libtre5-0.8.0_git201402282055-5.8.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tre-0.8.0_git201402282055-5.8.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tre-0.8.0_git201402282055-5.8.aarch64", }, product_reference: "tre-0.8.0_git201402282055-5.8.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tre-0.8.0_git201402282055-5.8.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tre-0.8.0_git201402282055-5.8.ppc64le", }, product_reference: "tre-0.8.0_git201402282055-5.8.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tre-0.8.0_git201402282055-5.8.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tre-0.8.0_git201402282055-5.8.s390x", }, product_reference: "tre-0.8.0_git201402282055-5.8.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tre-0.8.0_git201402282055-5.8.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tre-0.8.0_git201402282055-5.8.x86_64", }, product_reference: "tre-0.8.0_git201402282055-5.8.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tre-devel-0.8.0_git201402282055-5.8.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tre-devel-0.8.0_git201402282055-5.8.aarch64", }, product_reference: "tre-devel-0.8.0_git201402282055-5.8.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tre-devel-0.8.0_git201402282055-5.8.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tre-devel-0.8.0_git201402282055-5.8.ppc64le", }, product_reference: "tre-devel-0.8.0_git201402282055-5.8.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tre-devel-0.8.0_git201402282055-5.8.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tre-devel-0.8.0_git201402282055-5.8.s390x", }, product_reference: "tre-devel-0.8.0_git201402282055-5.8.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tre-devel-0.8.0_git201402282055-5.8.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tre-devel-0.8.0_git201402282055-5.8.x86_64", }, product_reference: "tre-devel-0.8.0_git201402282055-5.8.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tre-lang-0.8.0_git201402282055-5.8.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tre-lang-0.8.0_git201402282055-5.8.aarch64", }, product_reference: "tre-lang-0.8.0_git201402282055-5.8.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tre-lang-0.8.0_git201402282055-5.8.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tre-lang-0.8.0_git201402282055-5.8.ppc64le", }, product_reference: "tre-lang-0.8.0_git201402282055-5.8.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tre-lang-0.8.0_git201402282055-5.8.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tre-lang-0.8.0_git201402282055-5.8.s390x", }, product_reference: "tre-lang-0.8.0_git201402282055-5.8.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tre-lang-0.8.0_git201402282055-5.8.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tre-lang-0.8.0_git201402282055-5.8.x86_64", }, product_reference: "tre-lang-0.8.0_git201402282055-5.8.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2016-8859", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8859", }, ], notes: [ { category: "general", text: "Multiple integer overflows in the TRE library and musl libc allow attackers to cause memory corruption via a large number of (1) states or (2) tags, which triggers an out-of-bounds write.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:agrep-0.8.0_git201402282055-5.8.aarch64", "openSUSE Tumbleweed:agrep-0.8.0_git201402282055-5.8.ppc64le", "openSUSE Tumbleweed:agrep-0.8.0_git201402282055-5.8.s390x", "openSUSE Tumbleweed:agrep-0.8.0_git201402282055-5.8.x86_64", "openSUSE Tumbleweed:libtre5-0.8.0_git201402282055-5.8.aarch64", "openSUSE Tumbleweed:libtre5-0.8.0_git201402282055-5.8.ppc64le", "openSUSE Tumbleweed:libtre5-0.8.0_git201402282055-5.8.s390x", "openSUSE Tumbleweed:libtre5-0.8.0_git201402282055-5.8.x86_64", "openSUSE Tumbleweed:tre-0.8.0_git201402282055-5.8.aarch64", "openSUSE Tumbleweed:tre-0.8.0_git201402282055-5.8.ppc64le", "openSUSE Tumbleweed:tre-0.8.0_git201402282055-5.8.s390x", "openSUSE Tumbleweed:tre-0.8.0_git201402282055-5.8.x86_64", "openSUSE Tumbleweed:tre-devel-0.8.0_git201402282055-5.8.aarch64", "openSUSE Tumbleweed:tre-devel-0.8.0_git201402282055-5.8.ppc64le", "openSUSE Tumbleweed:tre-devel-0.8.0_git201402282055-5.8.s390x", "openSUSE Tumbleweed:tre-devel-0.8.0_git201402282055-5.8.x86_64", "openSUSE Tumbleweed:tre-lang-0.8.0_git201402282055-5.8.aarch64", "openSUSE Tumbleweed:tre-lang-0.8.0_git201402282055-5.8.ppc64le", "openSUSE Tumbleweed:tre-lang-0.8.0_git201402282055-5.8.s390x", "openSUSE Tumbleweed:tre-lang-0.8.0_git201402282055-5.8.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8859", url: "https://www.suse.com/security/cve/CVE-2016-8859", }, { category: "external", summary: "SUSE Bug 1005483 for CVE-2016-8859", url: "https://bugzilla.suse.com/1005483", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:agrep-0.8.0_git201402282055-5.8.aarch64", "openSUSE Tumbleweed:agrep-0.8.0_git201402282055-5.8.ppc64le", "openSUSE Tumbleweed:agrep-0.8.0_git201402282055-5.8.s390x", "openSUSE Tumbleweed:agrep-0.8.0_git201402282055-5.8.x86_64", "openSUSE Tumbleweed:libtre5-0.8.0_git201402282055-5.8.aarch64", "openSUSE Tumbleweed:libtre5-0.8.0_git201402282055-5.8.ppc64le", "openSUSE Tumbleweed:libtre5-0.8.0_git201402282055-5.8.s390x", "openSUSE Tumbleweed:libtre5-0.8.0_git201402282055-5.8.x86_64", "openSUSE Tumbleweed:tre-0.8.0_git201402282055-5.8.aarch64", "openSUSE Tumbleweed:tre-0.8.0_git201402282055-5.8.ppc64le", "openSUSE Tumbleweed:tre-0.8.0_git201402282055-5.8.s390x", "openSUSE Tumbleweed:tre-0.8.0_git201402282055-5.8.x86_64", "openSUSE Tumbleweed:tre-devel-0.8.0_git201402282055-5.8.aarch64", "openSUSE Tumbleweed:tre-devel-0.8.0_git201402282055-5.8.ppc64le", "openSUSE Tumbleweed:tre-devel-0.8.0_git201402282055-5.8.s390x", "openSUSE Tumbleweed:tre-devel-0.8.0_git201402282055-5.8.x86_64", "openSUSE Tumbleweed:tre-lang-0.8.0_git201402282055-5.8.aarch64", "openSUSE Tumbleweed:tre-lang-0.8.0_git201402282055-5.8.ppc64le", "openSUSE Tumbleweed:tre-lang-0.8.0_git201402282055-5.8.s390x", "openSUSE Tumbleweed:tre-lang-0.8.0_git201402282055-5.8.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:agrep-0.8.0_git201402282055-5.8.aarch64", "openSUSE Tumbleweed:agrep-0.8.0_git201402282055-5.8.ppc64le", "openSUSE Tumbleweed:agrep-0.8.0_git201402282055-5.8.s390x", "openSUSE Tumbleweed:agrep-0.8.0_git201402282055-5.8.x86_64", "openSUSE Tumbleweed:libtre5-0.8.0_git201402282055-5.8.aarch64", "openSUSE Tumbleweed:libtre5-0.8.0_git201402282055-5.8.ppc64le", "openSUSE Tumbleweed:libtre5-0.8.0_git201402282055-5.8.s390x", "openSUSE Tumbleweed:libtre5-0.8.0_git201402282055-5.8.x86_64", "openSUSE Tumbleweed:tre-0.8.0_git201402282055-5.8.aarch64", "openSUSE Tumbleweed:tre-0.8.0_git201402282055-5.8.ppc64le", "openSUSE Tumbleweed:tre-0.8.0_git201402282055-5.8.s390x", "openSUSE Tumbleweed:tre-0.8.0_git201402282055-5.8.x86_64", "openSUSE Tumbleweed:tre-devel-0.8.0_git201402282055-5.8.aarch64", "openSUSE Tumbleweed:tre-devel-0.8.0_git201402282055-5.8.ppc64le", "openSUSE Tumbleweed:tre-devel-0.8.0_git201402282055-5.8.s390x", "openSUSE Tumbleweed:tre-devel-0.8.0_git201402282055-5.8.x86_64", "openSUSE Tumbleweed:tre-lang-0.8.0_git201402282055-5.8.aarch64", "openSUSE Tumbleweed:tre-lang-0.8.0_git201402282055-5.8.ppc64le", "openSUSE Tumbleweed:tre-lang-0.8.0_git201402282055-5.8.s390x", "openSUSE Tumbleweed:tre-lang-0.8.0_git201402282055-5.8.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-8859", }, ], }
opensuse-su-2020:0554-1
Vulnerability from csaf_opensuse
Published
2020-04-26 14:12
Modified
2020-04-26 14:12
Summary
Security update for kubernetes
Notes
Title of the patch
Security update for kubernetes
Description of the patch
This update introduces kubernetes version 1.14.1 and cri-o 1.17.1 to Leap 15.1.
Patchnames
openSUSE-2020-554
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for kubernetes", title: "Title of the patch", }, { category: "description", text: "\nThis update introduces kubernetes version 1.14.1 and cri-o 1.17.1 to Leap 15.1.\n", title: "Description of the patch", }, { category: "details", text: "openSUSE-2020-554", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_0554-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2020:0554-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KLMQUDJXG7ORWF7M42NKLDUJSKHAUTS/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2020:0554-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KLMQUDJXG7ORWF7M42NKLDUJSKHAUTS/", }, { category: "self", summary: "SUSE Bug 1039663", url: "https://bugzilla.suse.com/1039663", }, { category: "self", summary: "SUSE Bug 1042383", url: "https://bugzilla.suse.com/1042383", }, { category: "self", summary: "SUSE Bug 1042387", url: "https://bugzilla.suse.com/1042387", }, { category: "self", summary: "SUSE Bug 1057277", url: "https://bugzilla.suse.com/1057277", }, { category: "self", summary: "SUSE Bug 1059207", url: "https://bugzilla.suse.com/1059207", }, { category: "self", summary: "SUSE Bug 1061027", url: "https://bugzilla.suse.com/1061027", }, { category: "self", summary: "SUSE Bug 1065972", url: "https://bugzilla.suse.com/1065972", }, { category: "self", summary: "SUSE Bug 1069469", url: "https://bugzilla.suse.com/1069469", }, { category: "self", summary: "SUSE Bug 1084765", url: "https://bugzilla.suse.com/1084765", }, { category: "self", summary: "SUSE Bug 1084766", url: "https://bugzilla.suse.com/1084766", }, { category: "self", summary: "SUSE Bug 1085009", url: "https://bugzilla.suse.com/1085009", }, { category: "self", summary: "SUSE Bug 1086185", url: "https://bugzilla.suse.com/1086185", }, { category: "self", summary: "SUSE Bug 1086412", url: "https://bugzilla.suse.com/1086412", }, { category: "self", summary: "SUSE Bug 1095131", url: "https://bugzilla.suse.com/1095131", }, { category: "self", summary: "SUSE Bug 1095154", url: "https://bugzilla.suse.com/1095154", }, { category: "self", summary: "SUSE Bug 1096773", url: "https://bugzilla.suse.com/1096773", }, { category: "self", summary: "SUSE Bug 1097473", url: "https://bugzilla.suse.com/1097473", }, { category: "self", summary: "SUSE Bug 1100838", url: "https://bugzilla.suse.com/1100838", }, { category: "self", summary: "SUSE Bug 1101010", url: "https://bugzilla.suse.com/1101010", }, { category: "self", summary: "SUSE Bug 1104598", url: "https://bugzilla.suse.com/1104598", }, { category: "self", summary: "SUSE Bug 1104821", url: "https://bugzilla.suse.com/1104821", }, { category: "self", summary: "SUSE Bug 1112980", url: "https://bugzilla.suse.com/1112980", }, { category: "self", summary: "SUSE Bug 1118897", url: "https://bugzilla.suse.com/1118897", }, { category: "self", summary: "SUSE Bug 1118898", url: "https://bugzilla.suse.com/1118898", }, { category: "self", summary: "SUSE Bug 1136403", url: "https://bugzilla.suse.com/1136403", }, { category: "self", summary: "SUSE Bug 1144065", url: "https://bugzilla.suse.com/1144065", }, { category: "self", summary: "SUSE Bug 1155323", url: "https://bugzilla.suse.com/1155323", }, { category: "self", summary: "SUSE Bug 1161056", url: "https://bugzilla.suse.com/1161056", }, { category: "self", summary: "SUSE Bug 1161179", url: "https://bugzilla.suse.com/1161179", }, { category: "self", summary: "SUSE CVE CVE-2016-5195 page", url: "https://www.suse.com/security/cve/CVE-2016-5195/", }, { category: "self", summary: "SUSE CVE CVE-2016-8859 page", url: "https://www.suse.com/security/cve/CVE-2016-8859/", }, { category: "self", summary: "SUSE CVE CVE-2017-1002101 page", url: "https://www.suse.com/security/cve/CVE-2017-1002101/", }, { category: "self", summary: "SUSE CVE CVE-2018-1002105 page", url: "https://www.suse.com/security/cve/CVE-2018-1002105/", }, { category: "self", summary: "SUSE CVE CVE-2018-16873 page", url: "https://www.suse.com/security/cve/CVE-2018-16873/", }, { category: "self", summary: "SUSE CVE CVE-2018-16874 page", url: "https://www.suse.com/security/cve/CVE-2018-16874/", }, { category: "self", summary: "SUSE CVE CVE-2019-10214 page", url: "https://www.suse.com/security/cve/CVE-2019-10214/", }, ], title: "Security update for kubernetes", tracking: { current_release_date: "2020-04-26T14:12:22Z", generator: { date: "2020-04-26T14:12:22Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2020:0554-1", initial_release_date: "2020-04-26T14:12:22Z", revision_history: [ { date: "2020-04-26T14:12:22Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cri-o-1.17.1-lp151.2.2.x86_64", product: { name: "cri-o-1.17.1-lp151.2.2.x86_64", product_id: "cri-o-1.17.1-lp151.2.2.x86_64", }, }, { category: "product_version", name: "cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", product: { name: "cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", product_id: "cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", }, }, { category: "product_version", name: "cri-tools-1.18.0-lp151.2.1.x86_64", product: { name: "cri-tools-1.18.0-lp151.2.1.x86_64", product_id: "cri-tools-1.18.0-lp151.2.1.x86_64", }, }, { category: "product_version", name: "go1.14-1.14-lp151.6.1.x86_64", product: { name: "go1.14-1.14-lp151.6.1.x86_64", product_id: "go1.14-1.14-lp151.6.1.x86_64", }, }, { category: "product_version", name: "go1.14-doc-1.14-lp151.6.1.x86_64", product: { name: "go1.14-doc-1.14-lp151.6.1.x86_64", product_id: "go1.14-doc-1.14-lp151.6.1.x86_64", }, }, { category: "product_version", name: "go1.14-race-1.14-lp151.6.1.x86_64", product: { name: "go1.14-race-1.14-lp151.6.1.x86_64", product_id: "go1.14-race-1.14-lp151.6.1.x86_64", }, }, { category: "product_version", name: "kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", product: { name: "kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", product_id: "kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", }, }, { category: "product_version", name: "kubernetes-client-1.18.0-lp151.5.1.x86_64", product: { name: "kubernetes-client-1.18.0-lp151.5.1.x86_64", product_id: "kubernetes-client-1.18.0-lp151.5.1.x86_64", }, }, { category: "product_version", name: "kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", product: { name: "kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", product_id: "kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", }, }, { category: "product_version", name: "kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", product: { name: "kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", product_id: "kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", }, }, { category: "product_version", name: "kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", product: { name: "kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", product_id: "kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", }, }, { category: "product_version", name: "kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", product: { name: "kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", product_id: "kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", }, }, { category: "product_version", name: "kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", product: { name: "kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", product_id: "kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", }, }, { category: "product_version", name: "kubernetes-master-1.18.0-lp151.5.1.x86_64", product: { name: "kubernetes-master-1.18.0-lp151.5.1.x86_64", product_id: "kubernetes-master-1.18.0-lp151.5.1.x86_64", }, }, { category: "product_version", name: "kubernetes-node-1.18.0-lp151.5.1.x86_64", product: { name: "kubernetes-node-1.18.0-lp151.5.1.x86_64", product_id: "kubernetes-node-1.18.0-lp151.5.1.x86_64", }, }, { category: "product_version", name: "kubernetes-proxy-1.18.0-lp151.5.1.x86_64", product: { name: "kubernetes-proxy-1.18.0-lp151.5.1.x86_64", product_id: "kubernetes-proxy-1.18.0-lp151.5.1.x86_64", }, }, { category: "product_version", name: "kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", product: { name: "kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", product_id: "kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.1", product: { name: "openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "cri-o-1.17.1-lp151.2.2.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", }, product_reference: "cri-o-1.17.1-lp151.2.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", }, product_reference: "cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "cri-tools-1.18.0-lp151.2.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", }, product_reference: "cri-tools-1.18.0-lp151.2.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "go1.14-1.14-lp151.6.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", }, product_reference: "go1.14-1.14-lp151.6.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "go1.14-doc-1.14-lp151.6.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", }, product_reference: "go1.14-doc-1.14-lp151.6.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "go1.14-race-1.14-lp151.6.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", }, product_reference: "go1.14-race-1.14-lp151.6.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kubernetes-apiserver-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", }, product_reference: "kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kubernetes-client-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", }, product_reference: "kubernetes-client-1.18.0-lp151.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", }, product_reference: "kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", }, product_reference: "kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", }, product_reference: "kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", }, product_reference: "kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", }, product_reference: "kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kubernetes-master-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", }, product_reference: "kubernetes-master-1.18.0-lp151.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kubernetes-node-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", }, product_reference: "kubernetes-node-1.18.0-lp151.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kubernetes-proxy-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", }, product_reference: "kubernetes-proxy-1.18.0-lp151.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kubernetes-scheduler-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", }, product_reference: "kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, ], }, vulnerabilities: [ { cve: "CVE-2016-5195", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5195", }, ], notes: [ { category: "general", text: "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5195", url: "https://www.suse.com/security/cve/CVE-2016-5195", }, { category: "external", summary: "SUSE Bug 1004418 for CVE-2016-5195", url: "https://bugzilla.suse.com/1004418", }, { category: "external", summary: "SUSE Bug 1004419 for CVE-2016-5195", url: "https://bugzilla.suse.com/1004419", }, { category: "external", summary: "SUSE Bug 1004436 for CVE-2016-5195", url: "https://bugzilla.suse.com/1004436", }, { category: "external", summary: "SUSE Bug 1006323 for CVE-2016-5195", url: "https://bugzilla.suse.com/1006323", }, { category: "external", summary: "SUSE Bug 1006695 for CVE-2016-5195", url: "https://bugzilla.suse.com/1006695", }, { category: "external", summary: "SUSE Bug 1007291 for CVE-2016-5195", url: "https://bugzilla.suse.com/1007291", }, { category: "external", summary: "SUSE Bug 1008110 for CVE-2016-5195", url: "https://bugzilla.suse.com/1008110", }, { category: "external", summary: "SUSE Bug 1030118 for CVE-2016-5195", url: "https://bugzilla.suse.com/1030118", }, { category: "external", summary: "SUSE Bug 1046453 for CVE-2016-5195", url: "https://bugzilla.suse.com/1046453", }, { category: "external", summary: "SUSE Bug 1069496 for CVE-2016-5195", url: "https://bugzilla.suse.com/1069496", }, { category: "external", summary: "SUSE Bug 1149725 for CVE-2016-5195", url: "https://bugzilla.suse.com/1149725", }, { category: "external", summary: "SUSE Bug 870618 for CVE-2016-5195", url: "https://bugzilla.suse.com/870618", }, { category: "external", summary: "SUSE Bug 986445 for CVE-2016-5195", url: "https://bugzilla.suse.com/986445", }, { category: "external", summary: "SUSE Bug 998689 for CVE-2016-5195", url: "https://bugzilla.suse.com/998689", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-04-26T14:12:22Z", details: "important", }, ], title: "CVE-2016-5195", }, { cve: "CVE-2016-8859", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8859", }, ], notes: [ { category: "general", text: "Multiple integer overflows in the TRE library and musl libc allow attackers to cause memory corruption via a large number of (1) states or (2) tags, which triggers an out-of-bounds write.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8859", url: "https://www.suse.com/security/cve/CVE-2016-8859", }, { category: "external", summary: "SUSE Bug 1005483 for CVE-2016-8859", url: "https://bugzilla.suse.com/1005483", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-04-26T14:12:22Z", details: "moderate", }, ], title: "CVE-2016-8859", }, { cve: "CVE-2017-1002101", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1002101", }, ], notes: [ { category: "general", text: "In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host's filesystem.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1002101", url: "https://www.suse.com/security/cve/CVE-2017-1002101", }, { category: "external", summary: "SUSE Bug 1084923 for CVE-2017-1002101", url: "https://bugzilla.suse.com/1084923", }, { category: "external", summary: "SUSE Bug 1085007 for CVE-2017-1002101", url: "https://bugzilla.suse.com/1085007", }, { category: "external", summary: "SUSE Bug 1085009 for CVE-2017-1002101", url: "https://bugzilla.suse.com/1085009", }, { category: "external", summary: "SUSE Bug 1096726 for CVE-2017-1002101", url: "https://bugzilla.suse.com/1096726", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-04-26T14:12:22Z", details: "important", }, ], title: "CVE-2017-1002101", }, { cve: "CVE-2018-1002105", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1002105", }, ], notes: [ { category: "general", text: "In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connection directly to the backend, authenticated with the Kubernetes API server's TLS credentials used to establish the backend connection.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1002105", url: "https://www.suse.com/security/cve/CVE-2018-1002105", }, { category: "external", summary: "SUSE Bug 1118198 for CVE-2018-1002105", url: "https://bugzilla.suse.com/1118198", }, { category: "external", summary: "SUSE Bug 1118260 for CVE-2018-1002105", url: "https://bugzilla.suse.com/1118260", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-04-26T14:12:22Z", details: "critical", }, ], title: "CVE-2018-1002105", }, { cve: "CVE-2018-16873", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16873", }, ], notes: [ { category: "general", text: "In Go before 1.10.6 and 1.11.x before 1.11.3, the \"go get\" command is vulnerable to remote code execution when executed with the -u flag and the import path of a malicious Go package, or a package that imports it directly or indirectly. Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). Using custom domains, it's possible to arrange things so that a Git repository is cloned to a folder named \".git\" by using a vanity import path that ends with \"/.git\". If the Git repository root contains a \"HEAD\" file, a \"config\" file, an \"objects\" directory, a \"refs\" directory, with some work to ensure the proper ordering of operations, \"go get -u\" can be tricked into considering the parent directory as a repository root, and running Git commands on it. That will use the \"config\" file in the original Git repository root for its configuration, and if that config file contains malicious commands, they will execute on the system running \"go get -u\".", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16873", url: "https://www.suse.com/security/cve/CVE-2018-16873", }, { category: "external", summary: "SUSE Bug 1118897 for CVE-2018-16873", url: "https://bugzilla.suse.com/1118897", }, { category: "external", summary: "SUSE Bug 1118898 for CVE-2018-16873", url: "https://bugzilla.suse.com/1118898", }, { category: "external", summary: "SUSE Bug 1118899 for CVE-2018-16873", url: "https://bugzilla.suse.com/1118899", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-04-26T14:12:22Z", details: "important", }, ], title: "CVE-2018-16873", }, { cve: "CVE-2018-16874", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16874", }, ], notes: [ { category: "general", text: "In Go before 1.10.6 and 1.11.x before 1.11.3, the \"go get\" command is vulnerable to directory traversal when executed with the import path of a malicious Go package which contains curly braces (both '{' and '}' characters). Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). The attacker can cause an arbitrary filesystem write, which can lead to code execution.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16874", url: "https://www.suse.com/security/cve/CVE-2018-16874", }, { category: "external", summary: "SUSE Bug 1118897 for CVE-2018-16874", url: "https://bugzilla.suse.com/1118897", }, { category: "external", summary: "SUSE Bug 1118898 for CVE-2018-16874", url: "https://bugzilla.suse.com/1118898", }, { category: "external", summary: "SUSE Bug 1118899 for CVE-2018-16874", url: "https://bugzilla.suse.com/1118899", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-04-26T14:12:22Z", details: "moderate", }, ], title: "CVE-2018-16874", }, { cve: "CVE-2019-10214", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-10214", }, ], notes: [ { category: "general", text: "The containers/image library used by the container tools Podman, Buildah, and Skopeo in Red Hat Enterprise Linux version 8 and CRI-O in OpenShift Container Platform, does not enforce TLS connections to the container registry authorization service. An attacker could use this vulnerability to launch a MiTM attack and steal login credentials or bearer tokens.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-10214", url: "https://www.suse.com/security/cve/CVE-2019-10214", }, { category: "external", summary: "SUSE Bug 1144065 for CVE-2019-10214", url: "https://bugzilla.suse.com/1144065", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-04-26T14:12:22Z", details: "important", }, ], title: "CVE-2019-10214", }, ], }
opensuse-su-2024:10901-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
kubernetes-apiserver-1.22.2-21.2 on GA media
Notes
Title of the patch
kubernetes-apiserver-1.22.2-21.2 on GA media
Description of the patch
These are all security issues fixed in the kubernetes-apiserver-1.22.2-21.2 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10901
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "kubernetes-apiserver-1.22.2-21.2 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the kubernetes-apiserver-1.22.2-21.2 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-10901", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10901-1.json", }, { category: "self", summary: "SUSE CVE CVE-2016-5195 page", url: "https://www.suse.com/security/cve/CVE-2016-5195/", }, { category: "self", summary: "SUSE CVE CVE-2016-8859 page", url: "https://www.suse.com/security/cve/CVE-2016-8859/", }, { category: "self", summary: "SUSE CVE CVE-2017-1002101 page", url: "https://www.suse.com/security/cve/CVE-2017-1002101/", }, { category: "self", summary: "SUSE CVE CVE-2018-1002105 page", url: "https://www.suse.com/security/cve/CVE-2018-1002105/", }, { category: "self", summary: "SUSE CVE CVE-2019-11247 page", url: "https://www.suse.com/security/cve/CVE-2019-11247/", }, { category: "self", summary: "SUSE CVE CVE-2019-11249 page", url: "https://www.suse.com/security/cve/CVE-2019-11249/", }, { category: "self", summary: "SUSE CVE CVE-2019-11253 page", url: "https://www.suse.com/security/cve/CVE-2019-11253/", }, { category: "self", summary: "SUSE CVE CVE-2019-9512 page", url: "https://www.suse.com/security/cve/CVE-2019-9512/", }, ], title: "kubernetes-apiserver-1.22.2-21.2 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:10901-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kubernetes-apiserver-1.22.2-21.2.aarch64", product: { name: "kubernetes-apiserver-1.22.2-21.2.aarch64", product_id: "kubernetes-apiserver-1.22.2-21.2.aarch64", }, }, { category: "product_version", name: "kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", product: { name: "kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", product_id: "kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", }, }, { category: "product_version", name: "kubernetes-client-1.22.2-21.2.aarch64", product: { name: "kubernetes-client-1.22.2-21.2.aarch64", product_id: "kubernetes-client-1.22.2-21.2.aarch64", }, }, { category: "product_version", name: "kubernetes-controller-manager-1.22.2-21.2.aarch64", product: { name: "kubernetes-controller-manager-1.22.2-21.2.aarch64", product_id: "kubernetes-controller-manager-1.22.2-21.2.aarch64", }, }, { category: "product_version", name: "kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", product: { name: "kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", product_id: "kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", }, }, { category: "product_version", name: "kubernetes-coredns-1.8.4-21.2.aarch64", product: { name: "kubernetes-coredns-1.8.4-21.2.aarch64", product_id: "kubernetes-coredns-1.8.4-21.2.aarch64", }, }, { category: "product_version", name: "kubernetes-coredns-minus1-1.8.0-21.2.aarch64", product: { name: "kubernetes-coredns-minus1-1.8.0-21.2.aarch64", product_id: "kubernetes-coredns-minus1-1.8.0-21.2.aarch64", }, }, { category: "product_version", name: "kubernetes-etcd-3.5.0-21.2.aarch64", product: { name: "kubernetes-etcd-3.5.0-21.2.aarch64", product_id: "kubernetes-etcd-3.5.0-21.2.aarch64", }, }, { category: "product_version", name: "kubernetes-etcd-minus1-3.4.13-21.2.aarch64", product: { name: "kubernetes-etcd-minus1-3.4.13-21.2.aarch64", product_id: "kubernetes-etcd-minus1-3.4.13-21.2.aarch64", }, }, { category: "product_version", name: "kubernetes-kubeadm-1.22.2-21.2.aarch64", product: { name: "kubernetes-kubeadm-1.22.2-21.2.aarch64", product_id: "kubernetes-kubeadm-1.22.2-21.2.aarch64", }, }, { category: "product_version", name: "kubernetes-kubelet-1.22.2-21.2.aarch64", product: { name: "kubernetes-kubelet-1.22.2-21.2.aarch64", product_id: "kubernetes-kubelet-1.22.2-21.2.aarch64", }, }, { category: "product_version", name: "kubernetes-proxy-1.22.2-21.2.aarch64", product: { name: "kubernetes-proxy-1.22.2-21.2.aarch64", product_id: "kubernetes-proxy-1.22.2-21.2.aarch64", }, }, { category: "product_version", name: "kubernetes-proxy-minus1-1.21.5-21.2.aarch64", product: { name: "kubernetes-proxy-minus1-1.21.5-21.2.aarch64", product_id: "kubernetes-proxy-minus1-1.21.5-21.2.aarch64", }, }, { category: "product_version", name: "kubernetes-scheduler-1.22.2-21.2.aarch64", product: { name: "kubernetes-scheduler-1.22.2-21.2.aarch64", product_id: "kubernetes-scheduler-1.22.2-21.2.aarch64", }, }, { category: "product_version", name: "kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", product: { name: "kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", product_id: "kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kubernetes-apiserver-1.22.2-21.2.ppc64le", product: { name: "kubernetes-apiserver-1.22.2-21.2.ppc64le", product_id: "kubernetes-apiserver-1.22.2-21.2.ppc64le", }, }, { category: "product_version", name: "kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", product: { name: "kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", product_id: "kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", }, }, { category: "product_version", name: "kubernetes-client-1.22.2-21.2.ppc64le", product: { name: "kubernetes-client-1.22.2-21.2.ppc64le", product_id: "kubernetes-client-1.22.2-21.2.ppc64le", }, }, { category: "product_version", name: "kubernetes-controller-manager-1.22.2-21.2.ppc64le", product: { name: "kubernetes-controller-manager-1.22.2-21.2.ppc64le", product_id: "kubernetes-controller-manager-1.22.2-21.2.ppc64le", }, }, { category: "product_version", name: "kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", product: { name: "kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", product_id: "kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", }, }, { category: "product_version", name: "kubernetes-coredns-1.8.4-21.2.ppc64le", product: { name: "kubernetes-coredns-1.8.4-21.2.ppc64le", product_id: "kubernetes-coredns-1.8.4-21.2.ppc64le", }, }, { category: "product_version", name: "kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", product: { name: "kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", product_id: "kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", }, }, { category: "product_version", name: "kubernetes-etcd-3.5.0-21.2.ppc64le", product: { name: "kubernetes-etcd-3.5.0-21.2.ppc64le", product_id: "kubernetes-etcd-3.5.0-21.2.ppc64le", }, }, { category: "product_version", name: "kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", product: { name: "kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", product_id: "kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", }, }, { category: "product_version", name: "kubernetes-kubeadm-1.22.2-21.2.ppc64le", product: { name: "kubernetes-kubeadm-1.22.2-21.2.ppc64le", product_id: "kubernetes-kubeadm-1.22.2-21.2.ppc64le", }, }, { category: "product_version", name: "kubernetes-kubelet-1.22.2-21.2.ppc64le", product: { name: "kubernetes-kubelet-1.22.2-21.2.ppc64le", product_id: "kubernetes-kubelet-1.22.2-21.2.ppc64le", }, }, { category: "product_version", name: "kubernetes-proxy-1.22.2-21.2.ppc64le", product: { name: "kubernetes-proxy-1.22.2-21.2.ppc64le", product_id: "kubernetes-proxy-1.22.2-21.2.ppc64le", }, }, { category: "product_version", name: "kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", product: { name: "kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", product_id: "kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", }, }, { category: "product_version", name: "kubernetes-scheduler-1.22.2-21.2.ppc64le", product: { name: "kubernetes-scheduler-1.22.2-21.2.ppc64le", product_id: "kubernetes-scheduler-1.22.2-21.2.ppc64le", }, }, { category: "product_version", name: "kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", product: { name: "kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", product_id: "kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kubernetes-apiserver-1.22.2-21.2.s390x", product: { name: "kubernetes-apiserver-1.22.2-21.2.s390x", product_id: "kubernetes-apiserver-1.22.2-21.2.s390x", }, }, { category: "product_version", name: "kubernetes-apiserver-minus1-1.21.5-21.2.s390x", product: { name: "kubernetes-apiserver-minus1-1.21.5-21.2.s390x", product_id: "kubernetes-apiserver-minus1-1.21.5-21.2.s390x", }, }, { category: "product_version", name: "kubernetes-client-1.22.2-21.2.s390x", product: { name: "kubernetes-client-1.22.2-21.2.s390x", product_id: "kubernetes-client-1.22.2-21.2.s390x", }, }, { category: "product_version", name: "kubernetes-controller-manager-1.22.2-21.2.s390x", product: { name: "kubernetes-controller-manager-1.22.2-21.2.s390x", product_id: "kubernetes-controller-manager-1.22.2-21.2.s390x", }, }, { category: "product_version", name: "kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", product: { name: "kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", product_id: "kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", }, }, { category: "product_version", name: "kubernetes-coredns-1.8.4-21.2.s390x", product: { name: "kubernetes-coredns-1.8.4-21.2.s390x", product_id: "kubernetes-coredns-1.8.4-21.2.s390x", }, }, { category: "product_version", name: "kubernetes-coredns-minus1-1.8.0-21.2.s390x", product: { name: "kubernetes-coredns-minus1-1.8.0-21.2.s390x", product_id: "kubernetes-coredns-minus1-1.8.0-21.2.s390x", }, }, { category: "product_version", name: "kubernetes-etcd-3.5.0-21.2.s390x", product: { name: "kubernetes-etcd-3.5.0-21.2.s390x", product_id: "kubernetes-etcd-3.5.0-21.2.s390x", }, }, { category: "product_version", name: "kubernetes-etcd-minus1-3.4.13-21.2.s390x", product: { name: "kubernetes-etcd-minus1-3.4.13-21.2.s390x", product_id: "kubernetes-etcd-minus1-3.4.13-21.2.s390x", }, }, { category: "product_version", name: "kubernetes-kubeadm-1.22.2-21.2.s390x", product: { name: "kubernetes-kubeadm-1.22.2-21.2.s390x", product_id: "kubernetes-kubeadm-1.22.2-21.2.s390x", }, }, { category: "product_version", name: "kubernetes-kubelet-1.22.2-21.2.s390x", product: { name: "kubernetes-kubelet-1.22.2-21.2.s390x", product_id: "kubernetes-kubelet-1.22.2-21.2.s390x", }, }, { category: "product_version", name: "kubernetes-proxy-1.22.2-21.2.s390x", product: { name: "kubernetes-proxy-1.22.2-21.2.s390x", product_id: "kubernetes-proxy-1.22.2-21.2.s390x", }, }, { category: "product_version", name: "kubernetes-proxy-minus1-1.21.5-21.2.s390x", product: { name: "kubernetes-proxy-minus1-1.21.5-21.2.s390x", product_id: "kubernetes-proxy-minus1-1.21.5-21.2.s390x", }, }, { category: "product_version", name: "kubernetes-scheduler-1.22.2-21.2.s390x", product: { name: "kubernetes-scheduler-1.22.2-21.2.s390x", product_id: "kubernetes-scheduler-1.22.2-21.2.s390x", }, }, { category: "product_version", name: "kubernetes-scheduler-minus1-1.21.5-21.2.s390x", product: { name: "kubernetes-scheduler-minus1-1.21.5-21.2.s390x", product_id: "kubernetes-scheduler-minus1-1.21.5-21.2.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "kubernetes-apiserver-1.22.2-21.2.x86_64", product: { name: "kubernetes-apiserver-1.22.2-21.2.x86_64", product_id: "kubernetes-apiserver-1.22.2-21.2.x86_64", }, }, { category: "product_version", name: "kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", product: { name: "kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", product_id: "kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", }, }, { category: "product_version", name: "kubernetes-client-1.22.2-21.2.x86_64", product: { name: "kubernetes-client-1.22.2-21.2.x86_64", product_id: "kubernetes-client-1.22.2-21.2.x86_64", }, }, { category: "product_version", name: "kubernetes-controller-manager-1.22.2-21.2.x86_64", product: { name: "kubernetes-controller-manager-1.22.2-21.2.x86_64", product_id: "kubernetes-controller-manager-1.22.2-21.2.x86_64", }, }, { category: "product_version", name: "kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", product: { name: "kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", product_id: "kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", }, }, { category: "product_version", name: "kubernetes-coredns-1.8.4-21.2.x86_64", product: { name: "kubernetes-coredns-1.8.4-21.2.x86_64", product_id: "kubernetes-coredns-1.8.4-21.2.x86_64", }, }, { category: "product_version", name: "kubernetes-coredns-minus1-1.8.0-21.2.x86_64", product: { name: "kubernetes-coredns-minus1-1.8.0-21.2.x86_64", product_id: "kubernetes-coredns-minus1-1.8.0-21.2.x86_64", }, }, { category: "product_version", name: "kubernetes-etcd-3.5.0-21.2.x86_64", product: { name: "kubernetes-etcd-3.5.0-21.2.x86_64", product_id: "kubernetes-etcd-3.5.0-21.2.x86_64", }, }, { category: "product_version", name: "kubernetes-etcd-minus1-3.4.13-21.2.x86_64", product: { name: "kubernetes-etcd-minus1-3.4.13-21.2.x86_64", product_id: "kubernetes-etcd-minus1-3.4.13-21.2.x86_64", }, }, { category: "product_version", name: "kubernetes-kubeadm-1.22.2-21.2.x86_64", product: { name: "kubernetes-kubeadm-1.22.2-21.2.x86_64", product_id: "kubernetes-kubeadm-1.22.2-21.2.x86_64", }, }, { category: "product_version", name: "kubernetes-kubelet-1.22.2-21.2.x86_64", product: { name: "kubernetes-kubelet-1.22.2-21.2.x86_64", product_id: "kubernetes-kubelet-1.22.2-21.2.x86_64", }, }, { category: "product_version", name: "kubernetes-proxy-1.22.2-21.2.x86_64", product: { name: "kubernetes-proxy-1.22.2-21.2.x86_64", product_id: "kubernetes-proxy-1.22.2-21.2.x86_64", }, }, { category: "product_version", name: "kubernetes-proxy-minus1-1.21.5-21.2.x86_64", product: { name: "kubernetes-proxy-minus1-1.21.5-21.2.x86_64", product_id: "kubernetes-proxy-minus1-1.21.5-21.2.x86_64", }, }, { category: "product_version", name: "kubernetes-scheduler-1.22.2-21.2.x86_64", product: { name: "kubernetes-scheduler-1.22.2-21.2.x86_64", product_id: "kubernetes-scheduler-1.22.2-21.2.x86_64", }, }, { category: "product_version", name: "kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", product: { name: "kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", product_id: "kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kubernetes-apiserver-1.22.2-21.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", }, product_reference: "kubernetes-apiserver-1.22.2-21.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-apiserver-1.22.2-21.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", }, product_reference: "kubernetes-apiserver-1.22.2-21.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-apiserver-1.22.2-21.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", }, product_reference: "kubernetes-apiserver-1.22.2-21.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-apiserver-1.22.2-21.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", }, product_reference: "kubernetes-apiserver-1.22.2-21.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-apiserver-minus1-1.21.5-21.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", }, product_reference: "kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", }, product_reference: "kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-apiserver-minus1-1.21.5-21.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", }, product_reference: "kubernetes-apiserver-minus1-1.21.5-21.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-apiserver-minus1-1.21.5-21.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", }, product_reference: "kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-client-1.22.2-21.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", }, product_reference: "kubernetes-client-1.22.2-21.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-client-1.22.2-21.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", }, product_reference: "kubernetes-client-1.22.2-21.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-client-1.22.2-21.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", }, product_reference: "kubernetes-client-1.22.2-21.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-client-1.22.2-21.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", }, product_reference: "kubernetes-client-1.22.2-21.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-controller-manager-1.22.2-21.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", }, product_reference: "kubernetes-controller-manager-1.22.2-21.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-controller-manager-1.22.2-21.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", }, product_reference: "kubernetes-controller-manager-1.22.2-21.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-controller-manager-1.22.2-21.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", }, product_reference: "kubernetes-controller-manager-1.22.2-21.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-controller-manager-1.22.2-21.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", }, product_reference: "kubernetes-controller-manager-1.22.2-21.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", }, product_reference: "kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", }, product_reference: "kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-controller-manager-minus1-1.21.5-21.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", }, product_reference: "kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", }, product_reference: "kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-coredns-1.8.4-21.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", }, product_reference: "kubernetes-coredns-1.8.4-21.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-coredns-1.8.4-21.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", }, product_reference: "kubernetes-coredns-1.8.4-21.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-coredns-1.8.4-21.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", }, product_reference: "kubernetes-coredns-1.8.4-21.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-coredns-1.8.4-21.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", }, product_reference: "kubernetes-coredns-1.8.4-21.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-coredns-minus1-1.8.0-21.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", }, product_reference: "kubernetes-coredns-minus1-1.8.0-21.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-coredns-minus1-1.8.0-21.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", }, product_reference: "kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-coredns-minus1-1.8.0-21.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", }, product_reference: "kubernetes-coredns-minus1-1.8.0-21.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-coredns-minus1-1.8.0-21.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", }, product_reference: "kubernetes-coredns-minus1-1.8.0-21.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-etcd-3.5.0-21.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", }, product_reference: "kubernetes-etcd-3.5.0-21.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-etcd-3.5.0-21.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", }, product_reference: "kubernetes-etcd-3.5.0-21.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-etcd-3.5.0-21.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", }, product_reference: "kubernetes-etcd-3.5.0-21.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-etcd-3.5.0-21.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", }, product_reference: "kubernetes-etcd-3.5.0-21.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-etcd-minus1-3.4.13-21.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", }, product_reference: "kubernetes-etcd-minus1-3.4.13-21.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-etcd-minus1-3.4.13-21.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", }, product_reference: "kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-etcd-minus1-3.4.13-21.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", }, product_reference: "kubernetes-etcd-minus1-3.4.13-21.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-etcd-minus1-3.4.13-21.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", }, product_reference: "kubernetes-etcd-minus1-3.4.13-21.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-kubeadm-1.22.2-21.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", }, product_reference: "kubernetes-kubeadm-1.22.2-21.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-kubeadm-1.22.2-21.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", }, product_reference: "kubernetes-kubeadm-1.22.2-21.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-kubeadm-1.22.2-21.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", }, product_reference: "kubernetes-kubeadm-1.22.2-21.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-kubeadm-1.22.2-21.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", }, product_reference: "kubernetes-kubeadm-1.22.2-21.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-kubelet-1.22.2-21.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", }, product_reference: "kubernetes-kubelet-1.22.2-21.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-kubelet-1.22.2-21.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", }, product_reference: "kubernetes-kubelet-1.22.2-21.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-kubelet-1.22.2-21.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", }, product_reference: "kubernetes-kubelet-1.22.2-21.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-kubelet-1.22.2-21.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", }, product_reference: "kubernetes-kubelet-1.22.2-21.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-proxy-1.22.2-21.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", }, product_reference: "kubernetes-proxy-1.22.2-21.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-proxy-1.22.2-21.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", }, product_reference: "kubernetes-proxy-1.22.2-21.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-proxy-1.22.2-21.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", }, product_reference: "kubernetes-proxy-1.22.2-21.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-proxy-1.22.2-21.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", }, product_reference: "kubernetes-proxy-1.22.2-21.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-proxy-minus1-1.21.5-21.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", }, product_reference: "kubernetes-proxy-minus1-1.21.5-21.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-proxy-minus1-1.21.5-21.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", }, product_reference: "kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-proxy-minus1-1.21.5-21.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", }, product_reference: "kubernetes-proxy-minus1-1.21.5-21.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-proxy-minus1-1.21.5-21.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", }, product_reference: "kubernetes-proxy-minus1-1.21.5-21.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-scheduler-1.22.2-21.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", }, product_reference: "kubernetes-scheduler-1.22.2-21.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-scheduler-1.22.2-21.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", }, product_reference: "kubernetes-scheduler-1.22.2-21.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-scheduler-1.22.2-21.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", }, product_reference: "kubernetes-scheduler-1.22.2-21.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-scheduler-1.22.2-21.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", }, product_reference: "kubernetes-scheduler-1.22.2-21.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-scheduler-minus1-1.21.5-21.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", }, product_reference: "kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", }, product_reference: "kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-scheduler-minus1-1.21.5-21.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", }, product_reference: "kubernetes-scheduler-minus1-1.21.5-21.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kubernetes-scheduler-minus1-1.21.5-21.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", }, product_reference: "kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2016-5195", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5195", }, ], notes: [ { category: "general", text: "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5195", url: "https://www.suse.com/security/cve/CVE-2016-5195", }, { category: "external", summary: "SUSE Bug 1004418 for CVE-2016-5195", url: "https://bugzilla.suse.com/1004418", }, { category: "external", summary: "SUSE Bug 1004419 for CVE-2016-5195", url: "https://bugzilla.suse.com/1004419", }, { category: "external", summary: "SUSE Bug 1004436 for CVE-2016-5195", url: "https://bugzilla.suse.com/1004436", }, { category: "external", summary: "SUSE Bug 1006323 for CVE-2016-5195", url: "https://bugzilla.suse.com/1006323", }, { category: "external", summary: "SUSE Bug 1006695 for CVE-2016-5195", url: "https://bugzilla.suse.com/1006695", }, { category: "external", summary: "SUSE Bug 1007291 for CVE-2016-5195", url: "https://bugzilla.suse.com/1007291", }, { category: "external", summary: "SUSE Bug 1008110 for CVE-2016-5195", url: "https://bugzilla.suse.com/1008110", }, { category: "external", summary: "SUSE Bug 1030118 for CVE-2016-5195", url: "https://bugzilla.suse.com/1030118", }, { category: "external", summary: "SUSE Bug 1046453 for CVE-2016-5195", url: "https://bugzilla.suse.com/1046453", }, { category: "external", summary: "SUSE Bug 1069496 for CVE-2016-5195", url: "https://bugzilla.suse.com/1069496", }, { category: "external", summary: "SUSE Bug 1149725 for CVE-2016-5195", url: "https://bugzilla.suse.com/1149725", }, { category: "external", summary: "SUSE Bug 870618 for CVE-2016-5195", url: "https://bugzilla.suse.com/870618", }, { category: "external", summary: "SUSE Bug 986445 for CVE-2016-5195", url: "https://bugzilla.suse.com/986445", }, { category: "external", summary: "SUSE Bug 998689 for CVE-2016-5195", url: "https://bugzilla.suse.com/998689", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2016-5195", }, { cve: "CVE-2016-8859", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8859", }, ], notes: [ { category: "general", text: "Multiple integer overflows in the TRE library and musl libc allow attackers to cause memory corruption via a large number of (1) states or (2) tags, which triggers an out-of-bounds write.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8859", url: "https://www.suse.com/security/cve/CVE-2016-8859", }, { category: "external", summary: "SUSE Bug 1005483 for CVE-2016-8859", url: "https://bugzilla.suse.com/1005483", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-8859", }, { cve: "CVE-2017-1002101", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1002101", }, ], notes: [ { category: "general", text: "In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host's filesystem.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1002101", url: "https://www.suse.com/security/cve/CVE-2017-1002101", }, { category: "external", summary: "SUSE Bug 1084923 for CVE-2017-1002101", url: "https://bugzilla.suse.com/1084923", }, { category: "external", summary: "SUSE Bug 1085007 for CVE-2017-1002101", url: "https://bugzilla.suse.com/1085007", }, { category: "external", summary: "SUSE Bug 1085009 for CVE-2017-1002101", url: "https://bugzilla.suse.com/1085009", }, { category: "external", summary: "SUSE Bug 1096726 for CVE-2017-1002101", url: "https://bugzilla.suse.com/1096726", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-1002101", }, { cve: "CVE-2018-1002105", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1002105", }, ], notes: [ { category: "general", text: "In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connection directly to the backend, authenticated with the Kubernetes API server's TLS credentials used to establish the backend connection.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1002105", url: "https://www.suse.com/security/cve/CVE-2018-1002105", }, { category: "external", summary: "SUSE Bug 1118198 for CVE-2018-1002105", url: "https://bugzilla.suse.com/1118198", }, { category: "external", summary: "SUSE Bug 1118260 for CVE-2018-1002105", url: "https://bugzilla.suse.com/1118260", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2018-1002105", }, { cve: "CVE-2019-11247", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-11247", }, ], notes: [ { category: "general", text: "The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in this manner are enforced using roles and role bindings within the namespace, meaning that a user with access only to a resource in one namespace could create, view update or delete the cluster-scoped resource (according to their namespace role privileges). Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-11247", url: "https://www.suse.com/security/cve/CVE-2019-11247", }, { category: "external", summary: "SUSE Bug 1142423 for CVE-2019-11247", url: "https://bugzilla.suse.com/1142423", }, { category: "external", summary: "SUSE Bug 1142434 for CVE-2019-11247", url: "https://bugzilla.suse.com/1142434", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-11247", }, { cve: "CVE-2019-11249", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-11249", }, ], notes: [ { category: "general", text: "The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes runs tar inside the container to create a tar archive, copies it over the network, and kubectl unpacks it on the user's machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user's machine when kubectl cp is called, limited only by the system permissions of the local user. Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.1, 1.2, 1.4, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-11249", url: "https://www.suse.com/security/cve/CVE-2019-11249", }, { category: "external", summary: "SUSE Bug 1144507 for CVE-2019-11249", url: "https://bugzilla.suse.com/1144507", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-11249", }, { cve: "CVE-2019-11253", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-11253", }, ], notes: [ { category: "general", text: "Improper input validation in the Kubernetes API server in versions v1.0-1.12 and versions prior to v1.13.12, v1.14.8, v1.15.5, and v1.16.2 allows authorized users to send malicious YAML or JSON payloads, causing the API server to consume excessive CPU or memory, potentially crashing and becoming unavailable. Prior to v1.14.0, default RBAC policy authorized anonymous users to submit requests that could trigger this vulnerability. Clusters upgraded from a version prior to v1.14.0 keep the more permissive policy by default for backwards compatibility.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-11253", url: "https://www.suse.com/security/cve/CVE-2019-11253", }, { category: "external", summary: "SUSE Bug 1152861 for CVE-2019-11253", url: "https://bugzilla.suse.com/1152861", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-11253", }, { cve: "CVE-2019-9512", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-9512", }, ], notes: [ { category: "general", text: "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-9512", url: "https://www.suse.com/security/cve/CVE-2019-9512", }, { category: "external", summary: "SUSE Bug 1145663 for CVE-2019-9512", url: "https://bugzilla.suse.com/1145663", }, { category: "external", summary: "SUSE Bug 1146099 for CVE-2019-9512", url: "https://bugzilla.suse.com/1146099", }, { category: "external", summary: "SUSE Bug 1146111 for CVE-2019-9512", url: "https://bugzilla.suse.com/1146111", }, { category: "external", summary: "SUSE Bug 1147142 for CVE-2019-9512", url: "https://bugzilla.suse.com/1147142", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-9512", }, ], }
gsd-2016-8859
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Multiple integer overflows in the TRE library and musl libc allow attackers to cause memory corruption via a large number of (1) states or (2) tags, which triggers an out-of-bounds write.
Aliases
Aliases
{ GSD: { alias: "CVE-2016-8859", description: "Multiple integer overflows in the TRE library and musl libc allow attackers to cause memory corruption via a large number of (1) states or (2) tags, which triggers an out-of-bounds write.", id: "GSD-2016-8859", references: [ "https://www.suse.com/security/cve/CVE-2016-8859.html", "https://advisories.mageia.org/CVE-2016-8859.html", "https://ubuntu.com/security/CVE-2016-8859", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2016-8859", ], details: "Multiple integer overflows in the TRE library and musl libc allow attackers to cause memory corruption via a large number of (1) states or (2) tags, which triggers an out-of-bounds write.", id: "GSD-2016-8859", modified: "2023-12-13T01:21:22.776156Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-8859", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple integer overflows in the TRE library and musl libc allow attackers to cause memory corruption via a large number of (1) states or (2) tags, which triggers an out-of-bounds write.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "93795", refsource: "BID", url: "http://www.securityfocus.com/bid/93795", }, { name: "GLSA-201701-11", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-11", }, { name: "[oss-security] 20161018 CVE Request - TRE & musl libc regex integer overflows in buffer size computations", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/10/19/1", }, { name: "[oss-security] 20161029 Re: CVE Request - TRE & musl libc regex integer overflows in buffer size computations", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/10/19/10", }, { name: "openSUSE-SU-2020:0554", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html", }, { name: "GLSA-202007-43", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/202007-43", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:etalabs:musl:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "1.1.15", vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-8859", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "Multiple integer overflows in the TRE library and musl libc allow attackers to cause memory corruption via a large number of (1) states or (2) tags, which triggers an out-of-bounds write.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-190", }, ], }, ], }, references: { reference_data: [ { name: "[oss-security] 20161029 Re: CVE Request - TRE & musl libc regex integer overflows in buffer size computations", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2016/10/19/10", }, { name: "[oss-security] 20161018 CVE Request - TRE & musl libc regex integer overflows in buffer size computations", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2016/10/19/1", }, { name: "93795", refsource: "BID", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/93795", }, { name: "GLSA-201701-11", refsource: "GENTOO", tags: [], url: "https://security.gentoo.org/glsa/201701-11", }, { name: "openSUSE-SU-2020:0554", refsource: "SUSE", tags: [], url: "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html", }, { name: "GLSA-202007-43", refsource: "GENTOO", tags: [], url: "https://security.gentoo.org/glsa/202007-43", }, ], }, }, impact: { baseMetricV2: { cvssV2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 5.9, }, }, lastModifiedDate: "2020-07-27T03:15Z", publishedDate: "2017-02-13T18:59Z", }, }, }
fkie_cve-2016-8859
Vulnerability from fkie_nvd
Published
2017-02-13 18:59
Modified
2025-04-20 01:37
Severity ?
Summary
Multiple integer overflows in the TRE library and musl libc allow attackers to cause memory corruption via a large number of (1) states or (2) tags, which triggers an out-of-bounds write.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:etalabs:musl:*:*:*:*:*:*:*:*", matchCriteriaId: "2CB79AB4-A363-48EB-BC67-A49DA19FB41C", versionEndIncluding: "1.1.15", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple integer overflows in the TRE library and musl libc allow attackers to cause memory corruption via a large number of (1) states or (2) tags, which triggers an out-of-bounds write.", }, { lang: "es", value: "Múltiples desbordamientos de enteros en la librería TRE y musl libc permiten a atacantes provocar corrupción de memoria a través de un gran número de (1) estados o (2) etiquetas, lo que desencadena una escritura fuera de límites.", }, ], id: "CVE-2016-8859", lastModified: "2025-04-20T01:37:25.860", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-02-13T18:59:00.753", references: [ { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2016/10/19/1", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2016/10/19/10", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/93795", }, { source: "cve@mitre.org", url: "https://security.gentoo.org/glsa/201701-11", }, { source: "cve@mitre.org", url: "https://security.gentoo.org/glsa/202007-43", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2016/10/19/1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2016/10/19/10", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/93795", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.gentoo.org/glsa/201701-11", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.gentoo.org/glsa/202007-43", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-190", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
ghsa-2r68-mjqv-c389
Vulnerability from github
Published
2022-05-13 01:25
Modified
2022-05-13 01:25
Severity ?
Details
Multiple integer overflows in the TRE library and musl libc allow attackers to cause memory corruption via a large number of (1) states or (2) tags, which triggers an out-of-bounds write.
{ affected: [], aliases: [ "CVE-2016-8859", ], database_specific: { cwe_ids: [ "CWE-190", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2017-02-13T18:59:00Z", severity: "CRITICAL", }, details: "Multiple integer overflows in the TRE library and musl libc allow attackers to cause memory corruption via a large number of (1) states or (2) tags, which triggers an out-of-bounds write.", id: "GHSA-2r68-mjqv-c389", modified: "2022-05-13T01:25:07Z", published: "2022-05-13T01:25:07Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2016-8859", }, { type: "WEB", url: "https://security.gentoo.org/glsa/201701-11", }, { type: "WEB", url: "https://security.gentoo.org/glsa/202007-43", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2016/10/19/1", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2016/10/19/10", }, { type: "WEB", url: "http://www.securityfocus.com/bid/93795", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.