You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to dependency file: /go_modules/spec/fixtures/projects/repo_not_found/go.mod
Path to vulnerable library: /go_modules/spec/fixtures/projects/repo_not_found/go.mod
Dependency Hierarchy:
❌ k8s.io/KUBERNETES-v1.15.9 (Vulnerable Library)
Found in base branch: main
Vulnerability Details
A security vulnerability was discovered in Kubernetes that could allow a
user with the ability to create a pod and associate a gitRepo volume to
execute arbitrary commands beyond the container boundary. This
vulnerability leverages the hooks folder in the target repository to run
arbitrary commands outside of the container's boundary.
Path to dependency file: /go_modules/spec/fixtures/projects/repo_not_found/go.mod
Path to vulnerable library: /go_modules/spec/fixtures/projects/repo_not_found/go.mod
Dependency Hierarchy:
❌ k8s.io/KUBERNETES-v1.15.9 (Vulnerable Library)
Found in base branch: main
Vulnerability Details
A flaw was found in kube-controller-manager. This issue occurs when the initial application of a HPA config YAML lacking a .spec.behavior.scaleUp block causes a denial of service due to KCM pods going into restart churn.
Path to dependency file: /go_modules/spec/fixtures/projects/repo_not_found/go.mod
Path to vulnerable library: /go_modules/spec/fixtures/projects/repo_not_found/go.mod
Dependency Hierarchy:
❌ k8s.io/KUBERNETES-v1.15.9 (Vulnerable Library)
Found in base branch: main
Vulnerability Details
The Kubernetes kube-controller-manager in versions v1.0-1.14, versions prior to v1.15.12, v1.16.9, v1.17.5, and version v1.18.0 are vulnerable to a Server Side Request Forgery (SSRF) that allows certain authorized users to leak up to 500 bytes of arbitrary information from unprotected endpoints within the master's host network (such as link-local or loopback services).
Path to dependency file: /go_modules/spec/fixtures/projects/repo_not_found/go.mod
Path to vulnerable library: /go_modules/spec/fixtures/projects/repo_not_found/go.mod
Dependency Hierarchy:
❌ k8s.io/KUBERNETES-v1.15.9 (Vulnerable Library)
Found in base branch: main
Vulnerability Details
The Kubernetes kube-controller-manager in versions v1.0-v1.17 is vulnerable to a credential leakage via error messages in mount failure logs and events for AzureFile and CephFS volumes.
Path to dependency file: /go_modules/spec/fixtures/projects/repo_not_found/go.mod
Path to vulnerable library: /go_modules/spec/fixtures/projects/repo_not_found/go.mod
Dependency Hierarchy:
❌ k8s.io/KUBERNETES-v1.15.9 (Vulnerable Library)
Found in base branch: main
Vulnerability Details
In etcd before versions 3.3.23 and 3.4.10, certain directory paths are created (etcd data directory and the directory path when provided to automatically generate self-signed certificates for TLS connections with clients) with restricted access permissions (700) by using the os.MkdirAll. This function does not perform any permission checks when a given directory path exists already. A possible workaround is to ensure the directories have the desired permission (700).
mend-for-github-combot
changed the title
k8s.io/KUBERNETES-v1.15.9: 5 vulnerabilities (highest severity is: 6.3)
k8s.io/KUBERNETES-v1.15.9: 3 vulnerabilities (highest severity is: 6.3)
Nov 10, 2024
mend-for-github-combot
changed the title
k8s.io/KUBERNETES-v1.15.9: 3 vulnerabilities (highest severity is: 6.3)
k8s.io/KUBERNETES-v1.15.9: 4 vulnerabilities (highest severity is: 7.7)
Nov 17, 2024
mend-for-github-combot
changed the title
k8s.io/KUBERNETES-v1.15.9: 4 vulnerabilities (highest severity is: 7.7)
k8s.io/KUBERNETES-v1.15.9: 5 vulnerabilities (highest severity is: 7.7)
Nov 21, 2024
mend-for-github-combot
changed the title
k8s.io/KUBERNETES-v1.15.9: 5 vulnerabilities (highest severity is: 7.7)
k8s.io/KUBERNETES-v1.15.9: 5 vulnerabilities (highest severity is: 8.1)
Nov 23, 2024
Vulnerable Library - k8s.io/KUBERNETES-v1.15.9
Production-Grade Container Scheduling and Management
Library home page: https://proxy.golang.org/k8s.io/!k!u!b!e!r!n!e!t!e!s/@v/v1.15.9.zip
Path to dependency file: /go_modules/spec/fixtures/projects/repo_not_found/go.mod
Path to vulnerable library: /go_modules/spec/fixtures/projects/repo_not_found/go.mod
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2024-10220
Vulnerable Library - k8s.io/KUBERNETES-v1.15.9
Production-Grade Container Scheduling and Management
Library home page: https://proxy.golang.org/k8s.io/!k!u!b!e!r!n!e!t!e!s/@v/v1.15.9.zip
Path to dependency file: /go_modules/spec/fixtures/projects/repo_not_found/go.mod
Path to vulnerable library: /go_modules/spec/fixtures/projects/repo_not_found/go.mod
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
A security vulnerability was discovered in Kubernetes that could allow a
user with the ability to create a pod and associate a gitRepo volume to
execute arbitrary commands beyond the container boundary. This
vulnerability leverages the hooks folder in the target repository to run
arbitrary commands outside of the container's boundary.
Publish Date: 2024-11-22
URL: CVE-2024-10220
CVSS 3 Score Details (8.1)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://seclists.org/oss-sec/2024/q4/109
Release Date: 2024-11-19
Fix Resolution: github.com/kubernetes/kubernetes-v1.28.12,v1.29.7,v1.30.3
⛑️ Automatic Remediation will be attempted for this issue.
CVE-2024-0793
Vulnerable Library - k8s.io/KUBERNETES-v1.15.9
Production-Grade Container Scheduling and Management
Library home page: https://proxy.golang.org/k8s.io/!k!u!b!e!r!n!e!t!e!s/@v/v1.15.9.zip
Path to dependency file: /go_modules/spec/fixtures/projects/repo_not_found/go.mod
Path to vulnerable library: /go_modules/spec/fixtures/projects/repo_not_found/go.mod
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
A flaw was found in kube-controller-manager. This issue occurs when the initial application of a HPA config YAML lacking a .spec.behavior.scaleUp block causes a denial of service due to KCM pods going into restart churn.
Publish Date: 2024-11-17
URL: CVE-2024-0793
CVSS 3 Score Details (7.7)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2024-11-17
Fix Resolution: github.com/openshift/kubernetes-8f8514080eaed5bdcbaa67a02d7314440aac5ec4
⛑️ Automatic Remediation will be attempted for this issue.
CVE-2020-8555
Vulnerable Library - k8s.io/KUBERNETES-v1.15.9
Production-Grade Container Scheduling and Management
Library home page: https://proxy.golang.org/k8s.io/!k!u!b!e!r!n!e!t!e!s/@v/v1.15.9.zip
Path to dependency file: /go_modules/spec/fixtures/projects/repo_not_found/go.mod
Path to vulnerable library: /go_modules/spec/fixtures/projects/repo_not_found/go.mod
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
The Kubernetes kube-controller-manager in versions v1.0-1.14, versions prior to v1.15.12, v1.16.9, v1.17.5, and version v1.18.0 are vulnerable to a Server Side Request Forgery (SSRF) that allows certain authorized users to leak up to 500 bytes of arbitrary information from unprotected endpoints within the master's host network (such as link-local or loopback services).
Publish Date: 2020-06-04
URL: CVE-2020-8555
CVSS 3 Score Details (6.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2020-06-05
Fix Resolution: v1.18.1,v1.17.5,v1.16.9,v1.15.12
⛑️ Automatic Remediation will be attempted for this issue.
CVE-2019-11252
Vulnerable Library - k8s.io/KUBERNETES-v1.15.9
Production-Grade Container Scheduling and Management
Library home page: https://proxy.golang.org/k8s.io/!k!u!b!e!r!n!e!t!e!s/@v/v1.15.9.zip
Path to dependency file: /go_modules/spec/fixtures/projects/repo_not_found/go.mod
Path to vulnerable library: /go_modules/spec/fixtures/projects/repo_not_found/go.mod
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
The Kubernetes kube-controller-manager in versions v1.0-v1.17 is vulnerable to a credential leakage via error messages in mount failure logs and events for AzureFile and CephFS volumes.
Publish Date: 2020-07-23
URL: CVE-2019-11252
CVSS 3 Score Details (5.9)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11252
Release Date: 2020-07-28
Fix Resolution: v1.18.0-beta.2
⛑️ Automatic Remediation will be attempted for this issue.
CVE-2020-15113
Vulnerable Library - k8s.io/KUBERNETES-v1.15.9
Production-Grade Container Scheduling and Management
Library home page: https://proxy.golang.org/k8s.io/!k!u!b!e!r!n!e!t!e!s/@v/v1.15.9.zip
Path to dependency file: /go_modules/spec/fixtures/projects/repo_not_found/go.mod
Path to vulnerable library: /go_modules/spec/fixtures/projects/repo_not_found/go.mod
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
In etcd before versions 3.3.23 and 3.4.10, certain directory paths are created (etcd data directory and the directory path when provided to automatically generate self-signed certificates for TLS connections with clients) with restricted access permissions (700) by using the os.MkdirAll. This function does not perform any permission checks when a given directory path exists already. A possible workaround is to ensure the directories have the desired permission (700).
Publish Date: 2020-08-05
URL: CVE-2020-15113
CVSS 3 Score Details (5.7)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2020-08-05
Fix Resolution: 3.4.10, 3.3.23
⛑️ Automatic Remediation will be attempted for this issue.
⛑️Automatic Remediation will be attempted for this issue.
The text was updated successfully, but these errors were encountered: