First published: Tue Apr 02 2019(Updated: )
Cloud Native Computing Foundation (CNCF) CNI (Container Networking Interface) 0.7.4 has a network firewall misconfiguration which affects Kubernetes. The CNI 'portmap' plugin, used to setup HostPorts for CNI, inserts rules at the front of the iptables nat chains; which take precedence over the KUBE- SERVICES chain. Because of this, the HostPort/portmap rule could match incoming traffic even if there were better fitting, more specific service definition rules like NodePorts later in the chain. The issue is fixed in CNI 0.7.5 and Kubernetes 1.11.9, 1.12.7, 1.13.5, and 1.14.0.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cncf Portmap | <0.7.5 | |
Kubernetes Kubernetes | <1.11.9 | |
Kubernetes Kubernetes | >=1.12.0<1.12.7 | |
Kubernetes Kubernetes | >=1.13.0<1.13.5 | |
Kubernetes Kubernetes | =1.13.6-beta0 | |
Kubernetes Kubernetes | =1.14.0-alpha0 | |
Kubernetes Kubernetes | =1.14.0-alpha1 | |
Kubernetes Kubernetes | =1.14.0-alpha2 | |
Kubernetes Kubernetes | =1.14.0-alpha3 | |
Kubernetes Kubernetes | =1.14.0-beta0 | |
Kubernetes Kubernetes | =1.14.0-beta1 | |
Kubernetes Kubernetes | =1.14.0-beta2 | |
Kubernetes Kubernetes | =1.14.0-rc1 | |
Netapp Cloud Insights | ||
<0.7.5 | ||
<1.11.9 | ||
>=1.12.0<1.12.7 | ||
>=1.13.0<1.13.5 | ||
=1.13.6-beta0 | ||
=1.14.0-alpha0 | ||
=1.14.0-alpha1 | ||
=1.14.0-alpha2 | ||
=1.14.0-alpha3 | ||
=1.14.0-beta0 | ||
=1.14.0-beta1 | ||
=1.14.0-beta2 | ||
=1.14.0-rc1 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-9946 is high with a severity value of 7.5.
The affected software includes Cloud Native Computing Foundation (CNCF) CNI (Container Networking Interface) 0.7.4 and Kubernetes versions up to 1.13.5.
The vulnerability in CVE-2019-9946 is a network firewall misconfiguration in the CNI 'portmap' plugin.
To fix CVE-2019-9946, update to CNI version 0.7.5 or later and Kubernetes version 1.13.6 or later.
More information about CVE-2019-9946 can be found at the following references: [Reference 1](https://access.redhat.com/errata/RHBA-2019:0862), [Reference 2](https://github.com/containernetworking/plugins/pull/269#issuecomment-477683272), [Reference 3](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCN66VYB3XS76SYH567SO7N3I254JOCT/).