安全公告/【CVE-2022-3294】

基本信息

漏洞名称:
受影响操作系统:Asianux
危险等级:高危
影响源码包:kubernetes
CVSS评分:8.8
发现日期:2023-08-31
修复版本:kubernetes-1.20.2-20

漏洞描述

Users may have access to secure endpoints in the control plane network. Kubernetes clusters are only affected if an untrusted user can modify Node objects and send proxy requests to them. Kubernetes supports node proxying, which allows clients of kube-apiserver to access endpoints of a Kubelet to establish connections to Pods, retrieve container logs, and more. While Kubernetes already validates the proxying address for Nodes, a bug in kube-apiserver made it possible to bypass this validation. Bypassing this validation could allow authenticated requests destined for Nodes to to the API server's private network.

修复方式

yum update PackageName

漏洞判定

执行命令yum info PackageName获取软件包版本号,版本小于修复版本,则受此漏洞影响,版本大于等于修复版本,则此漏洞已修复

补丁

参考

https://gitee.com/src-openeuler/kubernetes/issues/I60NS7
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3294
https://nvd.nist.gov/vuln/detail/CVE-2022-3294