The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Kubernetes

systemd: buffer overflow via dhcp6_option_append_ia
An attacker can generate a buffer overflow via dhcp6_option_append_ia() of systemd, in order to trigger a denial of service, and possibly to run code...
1639067, CVE-2018-15688, DLA-1580-1, FEDORA-2018-71d85bc8cd, FEDORA-2018-7243f31304, openSUSE-SU-2018:3695-1, openSUSE-SU-2018:3803-1, RHSA-2018:3665-01, RHSA-2019:0049-01, SUSE-SU-2018:3644-1, SUSE-SU-2018:3767-1, SUSE-SU-2018:3767-2, USN-3806-1, USN-3807-1, VIGILANCE-VUL-27677
Kubernetes: multiple vulnerabilities
An attacker can use several vulnerabilities of Kubernetes...
Kubernetes: three vulnerabilities
An attacker can use several vulnerabilities of Kubernetes...
event-exporter: vulnerability
A vulnerability of event-exporter was announced...
glibc: information disclosure via SSE2-optimized memmove
An attacker can bypass access restrictions to data via SSE2-optimized memmove() of glibc, in order to obtain sensitive information...
CVE-2017-18269, openSUSE-SU-2018:1600-1, openSUSE-SU-2018:2159-1, SUSE-SU-2018:1562-1, SUSE-SU-2018:1991-1, VIGILANCE-VUL-26324
Kubernetes: directory traversal via TAR Archives
An attacker can traverse directories via TAR Archives of Kubernetes, in order to create a file outside the service root path...
61297, CVE-2018-1002100, VIGILANCE-VUL-26308
git: code execution via gitmodules
An attacker can use a vulnerability via gitmodules of git, in order to run code...
bulletinjul2018, CERTFR-2018-AVI-263, CVE-2018-11235, DSA-4212-1, FEDORA-2018-080a3d7866, FEDORA-2018-75f7624a9f, FEDORA-2018-94eb743dad, FEDORA-2018-b10e54263a, openSUSE-SU-2018:1553-1, openSUSE-SU-2018:2502-1, openSUSE-SU-2018:3519-1, RHSA-2018:1957-01, RHSA-2018:2147-01, SSA:2018-152-01, SUSE-SU-2018:1566-1, SUSE-SU-2018:1872-1, SUSE-SU-2018:2469-1, SUSE-SU-2018:3440-1, USN-3671-1, VIGILANCE-VUL-26260
Kubernetes: vulnerability via Cluster Autoscaler
A vulnerability via Cluster Autoscaler of Kubernetes was announced...
Kubernetes: two vulnerabilities via Volume Subsystem
An attacker can use several vulnerabilities via Volume Subsystem of Kubernetes...
CVE-2017-1002101, CVE-2017-1002102, FEDORA-2018-16c8fdf9b8, FEDORA-2018-9b965c4eed, VIGILANCE-VUL-25531
glibc: code execution via RPATH
An attacker can use a vulnerability via RPATH of glibc, in order to run code...
CVE-2017-16997, FEDORA-2018-7714b514e2, FEDORA-2018-8e27ad96ed, openSUSE-SU-2018:0089-1, RHSA-2018:3092-01, SUSE-SU-2018:0074-1, USN-3534-1, VIGILANCE-VUL-25041
Our database contains other pages. You can request a free trial to read them.

Display information about Kubernetes: