First published: Fri Oct 09 2020(Updated: )
A flaw was found in kubernetes. In Kubernetes, if the logging level is to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like `kubectl`. Previously, CVE-2019-11250 was assigned for the same issue for logging levels of at least 4.
Credit: jordan@liggitt.net jordan@liggitt.net
Affected Software | Affected Version | How to fix |
---|---|---|
go/k8s.io/client-go | <0.17.16 | 0.17.16 |
go/k8s.io/client-go | >=0.18.0<0.18.14 | 0.18.14 |
go/k8s.io/client-go | >=0.20.0-alpha.0<0.20.0-alpha.2 | 0.20.0-alpha.2 |
go/k8s.io/client-go | >=0.19.0<0.19.6 | 0.19.6 |
redhat/mcg | <0:5.9.0-28.61dcf87.5.9.el8 | 0:5.9.0-28.61dcf87.5.9.el8 |
Kubernetes Kubernetes | >=1.17.0<=1.17.13 | |
Kubernetes Kubernetes | >=1.18.0<=1.18.10 | |
Kubernetes Kubernetes | >=1.19.0<=1.19.3 | |
redhat/kubernetes | <1.20.0 | 1.20.0 |
redhat/kubernetes | <1.19.6 | 1.19.6 |
redhat/kubernetes | <1.18.14 | 1.18.14 |
redhat/kubernetes | <1.17.16 | 1.17.16 |
go/k8s.io/kubernetes | <1.20.0-alpha.2 | 1.20.0-alpha.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-8565 is a vulnerability in Kubernetes where authorization and bearer tokens are written to log files when the logging level is set to at least 9.
CVE-2020-8565 has a severity value of 5.3, which is classified as medium severity.
To fix the CVE-2020-8565 vulnerability, update Kubernetes to version 1.20.0 or above.
There is no known workaround for the CVE-2020-8565 vulnerability. Updating Kubernetes to the fixed version is recommended.
You can find more information about CVE-2020-8565 on the Red Hat Security Advisory page and the GitHub pull request page.