First published: Fri Jan 17 2020(Updated: )
A flaw was found in the KubeVirt main virt-handler versions before 0.26.0 regarding the access permissions of virt-handler. An attacker with access to create VMs could attach any secret within their namespace, allowing them to read the contents of that secret.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/kubevirt.io/kubevirt | <0.26.0 | 0.26.0 |
redhat/kubevirt | <0.26.0 | 0.26.0 |
Kubevirt Kubevirt Kubernetes | <0.26.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw is CVE-2020-1701.
Versions before 0.26.0 of KubeVirt main virt-handler and Kubevirt are affected by this vulnerability.
The severity of CVE-2020-1701 is medium.
An attacker with access to create VMs could attach any secret within their namespace, allowing them to read the contents of that secret.
Yes, the fix for this vulnerability is to upgrade to version 0.26.0 of KubeVirt main virt-handler.