The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Kubernetes: denial of service via kubelet /etc/hosts

Synthesis of the vulnerability 

An attacker can trigger a fatal error via kubelet /etc/hosts of Kubernetes, in order to trigger a denial of service.
Vulnerable systems: Kubernetes.
Severity of this threat: 2/4.
Creation date: 15/07/2020.
Références of this weakness: CVE-2020-8557, VIGILANCE-VUL-32840.

Description of the vulnerability 

An attacker can trigger a fatal error via kubelet /etc/hosts of Kubernetes, in order to trigger a denial of service.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This weakness impacts software or systems such as Kubernetes.

Our Vigil@nce team determined that the severity of this vulnerability announce is medium.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this threat bulletin.

Solutions for this threat 

Kubernetes: fixed versions for kubelet /etc/hosts.
Fixed versions are indicated in information sources.

Wind River Linux: version 10.19.45.11.
The version 10.19.45.11 is fixed:
  https://support2.windriver.com/index.php?page=cve&on=list&show=50&product_id=1&product_version%5B0%5D=24&id_status%5B0%5D=4&cve_id_filter=&s=&submit=&order_by=cve_modified_date&order_way=desc#list
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a network vulnerability alert. Each administrator can customize the list of products for which he wants to receive vulnerability alerts.