{
  "threat_severity" : "Moderate",
  "public_date" : "2020-07-08T00:00:00Z",
  "bugzilla" : {
    "description" : "kubernetes: node localhost services reachable via martian packets",
    "id" : "1843358",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1843358"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.4",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-300",
  "details" : [ "The Kubelet and kube-proxy components in versions 1.1.0-1.16.10, 1.17.0-1.17.6, and 1.18.0-1.18.3 were found to contain a security issue which allows adjacent hosts to reach TCP and UDP services bound to 127.0.0.1 running on the node or in the node's network namespace. Such a service is generally thought to be reachable only by other processes on the same host, but due to this defeect, could be reachable by other hosts on the same LAN as the node, or by containers running on the same node as the service.", "A flaw was found in Kubernetes that allows attackers on adjacent networks to reach services exposed on localhost ports, previously thought to be unreachable. This flaw allows an attacker to gain privileges or access confidential information for any services listening on localhost ports that are not protected by authentication." ],
  "statement" : "OpenShift Container Platform does not expose the API server on a localhost port without authentication. The only service exposed on a localhost port not protected by authentication is Metrics, which exposes some cluster metadata.",
  "acknowledgement" : "Red Hat would like to thank the Kubernetes Product Security Committee for reporting this issue. Upstream acknowledges Ariel Zelivansky (Palo Alto Networks), János Kövér (Ericsson), Rory McCune (NCC Group), and Yuval Avrahami (Palo Alto Networks) as the original reporters.",
  "affected_release" : [ {
    "product_name" : "Red Hat OpenShift Container Platform 3.11",
    "release_date" : "2020-07-27T00:00:00Z",
    "advisory" : "RHSA-2020:2992",
    "cpe" : "cpe:/a:redhat:openshift:3.11::el7",
    "package" : "atomic-openshift-0:3.11.248-1.git.0.92ee8ac.el7"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.3",
    "release_date" : "2020-08-05T00:00:00Z",
    "advisory" : "RHSA-2020:3183",
    "cpe" : "cpe:/a:redhat:openshift:4.3::el7",
    "package" : "openshift-0:4.3.31-202007280738.p0.git.0.9884401.el7"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.3",
    "release_date" : "2020-08-05T00:00:00Z",
    "advisory" : "RHSA-2020:3184",
    "cpe" : "cpe:/a:redhat:openshift:4.3::el7",
    "package" : "openshift4/ose-hyperkube:v4.3.31-202007272153.p0"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.4",
    "release_date" : "2020-07-21T00:00:00Z",
    "advisory" : "RHSA-2020:2926",
    "cpe" : "cpe:/a:redhat:openshift:4.4::el7",
    "package" : "openshift4/ose-hyperkube:v4.4.0-202007120152.p0"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.4",
    "release_date" : "2020-07-21T00:00:00Z",
    "advisory" : "RHSA-2020:2927",
    "cpe" : "cpe:/a:redhat:openshift:4.4::el7",
    "package" : "openshift-0:4.4.0-202007090832.p0.git.0.bc32fb1.el7"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.5",
    "release_date" : "2020-07-13T00:00:00Z",
    "advisory" : "RHSA-2020:2412",
    "cpe" : "cpe:/a:redhat:openshift:4.5::el7",
    "package" : "openshift4/ose-hyperkube:v4.5.0-202007100518.p0"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.5",
    "release_date" : "2020-07-13T00:00:00Z",
    "advisory" : "RHSA-2020:2413",
    "cpe" : "cpe:/a:redhat:openshift:4.5::el7",
    "package" : "openshift-0:4.5.0-202007012112.p0.git.0.582d7fc.el7"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Storage 3",
    "fix_state" : "Not affected",
    "package_name" : "heketi",
    "cpe" : "cpe:/a:redhat:storage:3"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2020-8558\nhttps://nvd.nist.gov/vuln/detail/CVE-2020-8558\nhttps://groups.google.com/g/kubernetes-security-announce/c/B1VegbBDMTE" ],
  "name" : "CVE-2020-8558",
  "csaw" : false
}