-
Notifications
You must be signed in to change notification settings - Fork 40.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2017-1002102 - atomic writer volume handling allows arbitrary file deletion in host filesystem #60814
Comments
@liggitt: There are no sig labels on this issue. Please add a sig label. A sig label can be added by either:
Note: Method 1 will trigger an email to the group. See the group list. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
@sgorbaty thanks for reviewing the patch! Hard links are fine in this case because they cannot cross mounts. In general, if you see any further issues, please report it following the security disclosure process. @kubernetes/sig-storage-bugs |
Forcing configmap and secret mounts to be readonly is not acceptable. |
In k8s 1.9.4 and later a fix for kubernetes/kubernetes#60814 makes mounted secrets and config maps read-only. This breaks the current ceph-container image. This is a first patch fixing one of the issues. More fixes are required. See ceph#1004 for more details.
In k8s 1.9.4 and later a fix for kubernetes/kubernetes#60814 makes mounted secrets and config maps read-only. This breaks the current ceph-container image. This is a first patch fixing one of the issues. More fixes are required. See ceph#1004 for more details.
Project: oom master 180384b6787e2fe1663b93057e6024d7811c504a Merge "enforcing helm and kubernetes version requirements" enforcing helm and kubernetes version requirements helm 2.8.x k8s 1.7.14+ and 1.8.9+ versions selected because of: kubernetes/kubernetes#60814 Issue-ID: OOM-1075 Change-Id: Ife365ac8e8b7812c1fe4fa0764739511c3c6eb55 Signed-off-by: Mandeep Khinda <mandeep.khinda@amdocs.com>
helm 2.8.x k8s 1.7.14+ and 1.8.9+ versions selected because of: kubernetes/kubernetes#60814 Issue-ID: OOM-1075 Change-Id: Ife365ac8e8b7812c1fe4fa0764739511c3c6eb55 Signed-off-by: Mandeep Khinda <mandeep.khinda@amdocs.com>
/label official-cve-feed (Related to kubernetes/sig-security#1) |
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
This vulnerability allows containers using a secret, configMap, projected or downwardAPI volume to trigger deletion of arbitrary files and directories on the nodes where they are running.
Thanks to Joel Smith of Red Hat for reporting this problem.
Vulnerable versions:
Vulnerable configurations:
Vulnerability impact:
A malicious container running in a pod with a secret, configMap, downwardAPI or projected volume mounted (including auto-added service account token mounts) can cause the Kubelet to remove any file or directory on the host filesystem.
Mitigations prior to upgrading:
Do not allow containers to be run with secret, configMap, downwardAPI and projected volumes (note that this prevents use of service account tokens in pods, and requires use of
automountServiceAccountToken: false
)Fixed versions:
Fix impact:
Secret, configMap, downwardAPI and projected volumes will be mounted as read-only volumes. Applications that attempt to write to these volumes will receive read-only filesystem errors. Previously, applications were allowed to make changes to these volumes, but those changes were reverted at an arbitrary interval by the system. Applications should be re-configured to write derived files to another location.
The text was updated successfully, but these errors were encountered: