CWE
400
Advisory Published
CVE Published
CVE Published
Advisory Published
Updated

CVE-2020-8557: Kubernetes node disk Denial of Service by writing to container /etc/hosts

First published: Thu May 14 2020(Updated: )

A flaw was found in Kubernetes, where the amount of disk space the /etc/hosts file can use is unconstrained . This flaw can allow attacker-controlled pods to cause a denial of service if they have permission to write to the node's /etc/hosts file.

Credit: jordan@liggitt.net jordan@liggitt.net

Affected SoftwareAffected VersionHow to fix
redhat/atomic-openshift<0:3.11.542-1.git.0.f2fd300.el7
0:3.11.542-1.git.0.f2fd300.el7
redhat/openshift<0:4.3.37-202009120213.p0.git.0.dffefe4.el8
0:4.3.37-202009120213.p0.git.0.dffefe4.el8
redhat/openshift<0:4.4.0-202008250319.p0.git.0.d653415.el8
0:4.4.0-202008250319.p0.git.0.d653415.el8
redhat/openshift<0:4.5.0-202008130146.p0.git.0.aaf1d57.el8
0:4.5.0-202008130146.p0.git.0.aaf1d57.el8
Kubernetes Kubernetes<1.16.13
Kubernetes Kubernetes>=1.17.0<1.17.9
Kubernetes Kubernetes>=1.18.0<1.18.6
redhat/kubernetes<1.19.0
1.19.0
redhat/kubernetes<1.18.6
1.18.6
redhat/kubernetes<1.17.10
1.17.10
redhat/kubernetes<1.16.13
1.16.13
go/k8s.io/kubernetes/pkg/kubelet>=1.18.0<1.18.6
1.18.6
go/k8s.io/kubernetes/pkg/kubelet>=1.17.0<1.17.9
1.17.9
go/k8s.io/kubernetes/pkg/kubelet>=1.1.0<1.16.13
1.16.13

Remedy

On OpenShift Container Platform (OCP) 3.11 and 4.x it's possible to set the allowPrivilegeEscalation Security Context Constraint to 'false' to prevent this. Note that this is set to 'true' by default, and setting it to false will prevent certain binaries which require setuid to stop working. On OCP 3.11 for example the 'ping' command will no longer work [1]. On OCP 4.x and later the 'ping' command will work with allowPrivilegeEscalation set to False, but other setuid binaries will not work. [1] https://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is CVE-2020-8557?

    CVE-2020-8557 is a vulnerability in Kubernetes that allows a pod to exceed the disk space limit for the /etc/hosts file.

  • Which versions of Kubernetes are affected by CVE-2020-8557?

    Versions 1.1-1.16.12, 1.17.0-1.17.8, and 1.18.0-1.18.5 of Kubernetes are affected by CVE-2020-8557.

  • How does CVE-2020-8557 impact Kubernetes?

    CVE-2020-8557 allows a pod in Kubernetes to write to its own /etc/hosts file and exceed the disk space limit, which is not accounted for by the kubelet eviction manager when calculating ephemeral storage.

  • What is the severity of CVE-2020-8557?

    CVE-2020-8557 has a severity rating of medium with a CVSS score of 5.5.

  • How do I fix CVE-2020-8557 in Kubernetes?

    To fix CVE-2020-8557 in Kubernetes, update to version 1.19.0, 1.18.6, or 1.17.10, depending on your current version.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203