diff --git a/advisories/unreviewed/2022/05/GHSA-gc2p-g4fg-29vh/GHSA-gc2p-g4fg-29vh.json b/advisories/unreviewed/2022/05/GHSA-gc2p-g4fg-29vh/GHSA-gc2p-g4fg-29vh.json index 59d9e91ca79c4..1721d19445236 100644 --- a/advisories/unreviewed/2022/05/GHSA-gc2p-g4fg-29vh/GHSA-gc2p-g4fg-29vh.json +++ b/advisories/unreviewed/2022/05/GHSA-gc2p-g4fg-29vh/GHSA-gc2p-g4fg-29vh.json @@ -6,6 +6,7 @@ "aliases": [ "CVE-2019-11243" ], + "summary": "rest.AnonymousClientConfig() does not remove the serviceaccount credentials from config created by rest.InClusterConfig()", "details": "In Kubernetes v1.12.0-v1.12.4 and v1.13.0, the rest.AnonymousClientConfig() method returns a copy of the provided config, with credentials removed (bearer token, username/password, and client certificate/key data). In the affected versions, rest.AnonymousClientConfig() did not effectively clear service account credentials loaded using rest.InClusterConfig()", "severity": [ { @@ -13,7 +14,49 @@ "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "k8s.io/client-go" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.12.0" + }, + { + "fixed": "1.12.5" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Go", + "name": "k8s.io/client-go" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.13.0" + }, + { + "fixed": "1.13.1" + } + ] + } + ], + "versions": [ + "1.13.0" + ] + } + ], "references": [ { "type": "ADVISORY",