First published: Fri Oct 09 2020(Updated: )
In Kubernetes clusters using a logging level of at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. This affects < v1.19.3, < v1.18.10, < v1.17.13.
Credit: jordan@liggitt.net jordan@liggitt.net
Affected Software | Affected Version | How to fix |
---|---|---|
go/k8s.io/kubernetes | <1.20.0-alpha.1 | 1.20.0-alpha.1 |
go/github.com/kubernetes/kubernetes | <1.17.13 | 1.17.13 |
go/github.com/kubernetes/kubernetes | >=1.18.0<1.18.10 | 1.18.10 |
go/github.com/kubernetes/kubernetes | >=1.19.0<1.19.3 | 1.19.3 |
redhat/kubernetes | <1.19.3 | 1.19.3 |
redhat/kubernetes | <1.18.10 | 1.18.10 |
redhat/kubernetes | <1.17.13 | 1.17.13 |
redhat/atomic-openshift | <0:3.11.501-1.git.0.f8c4746.el7 | 0:3.11.501-1.git.0.f8c4746.el7 |
redhat/openshift-clients | <0:4.6.0-202010081244.p0.git.3794.4743d24.el8 | 0:4.6.0-202010081244.p0.git.3794.4743d24.el8 |
redhat/openshift | <0:4.6.0-202101160934.p0.git.94242.fc5242e.el7 | 0:4.6.0-202101160934.p0.git.94242.fc5242e.el7 |
Kubernetes Kubernetes | >=1.17.0<1.17.13 | |
Kubernetes Kubernetes | >=1.18.0<1.18.10 | |
Kubernetes Kubernetes | >=1.19.0<1.19.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-8564 is a vulnerability in Kubernetes that allows the contents of a malformed Docker config file to be leaked, potentially exposing pull secrets or other registry credentials.
CVE-2020-8564 has a severity score of 5.3, which is considered medium.
To fix CVE-2020-8564, update your Kubernetes to version 1.20.0-alpha.1, 1.17.13, 1.18.10, 1.19.3, or later.
You can find more information about CVE-2020-8564 on the CVE website, the NVD website, and in the Kubernetes GitHub repository.
The CWE for CVE-2020-8564 is CWE-117 (Improper Output Neutralization for Logs) and CWE-532 (Information Exposure Through Log Files).