<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Kubernetes Vulnerability Announcements - CVE Feed</title><link>https://kubernetes.io/docs/reference/issues-security/official-cve-feed/</link><description>Auto-refreshing official CVE feed for Kubernetes repository</description><generator>Hugo -- gohugo.io</generator><language>en-US</language><copyright>The Kubernetes Authors</copyright><lastBuildDate>Thu, 11 Sep 2025 13:45:56 +0000</lastBuildDate><atom:link href="https://kubernetes.io/docs/reference/issues-security/official-cve-feed/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2025-7445</title><link>https://github.com/kubernetes/kubernetes/issues/133897</link><pubDate>Thu, 04 Sep 2025 21:40:42 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2025-7445</guid><description>secrets-store-sync-controller discloses service account tokens in logs</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2025-5187</title><link>https://github.com/kubernetes/kubernetes/issues/133471</link><pubDate>Mon, 11 Aug 2025 16:29:36 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2025-5187</guid><description>Nodes can delete themselves by adding an OwnerReference</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2025-7342</title><link>https://github.com/kubernetes/kubernetes/issues/133115</link><pubDate>Mon, 21 Jul 2025 23:22:19 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2025-7342</guid><description>VM images built with Kubernetes Image Builder Nutanix or OVA providers use default credentials for Windows images if user did not override</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2025-4563</title><link>https://github.com/kubernetes/kubernetes/issues/132151</link><pubDate>Fri, 06 Jun 2025 15:48:26 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2025-4563</guid><description>Nodes can bypass dynamic resource allocation authorization checks</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2025-1974</title><link>https://github.com/kubernetes/kubernetes/issues/131009</link><pubDate>Sun, 23 Mar 2025 17:38:57 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2025-1974</guid><description>ingress-nginx admission controller RCE escalation</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2025-1098</title><link>https://github.com/kubernetes/kubernetes/issues/131008</link><pubDate>Sun, 23 Mar 2025 17:38:53 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2025-1098</guid><description>ingress-nginx controller configuration injection via unsanitized mirror annotations</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2025-1097</title><link>https://github.com/kubernetes/kubernetes/issues/131007</link><pubDate>Sun, 23 Mar 2025 17:38:49 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2025-1097</guid><description>ingress-nginx controller configuration injection via unsanitized auth-tls-match-cn annotation</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2025-24514</title><link>https://github.com/kubernetes/kubernetes/issues/131006</link><pubDate>Sun, 23 Mar 2025 17:38:44 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2025-24514</guid><description>ingress-nginx controller configuration injection via unsanitized auth-url annotation</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2025-24513</title><link>https://github.com/kubernetes/kubernetes/issues/131005</link><pubDate>Sun, 23 Mar 2025 17:38:28 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2025-24513</guid><description>ingress-nginx controller auth secret file path traversal vulnerability</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2025-1767</title><link>https://github.com/kubernetes/kubernetes/issues/130786</link><pubDate>Thu, 13 Mar 2025 16:08:20 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2025-1767</guid><description>GitRepo Volume Inadvertent Local Repository Access</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2025-0426</title><link>https://github.com/kubernetes/kubernetes/issues/130016</link><pubDate>Thu, 06 Feb 2025 20:03:44 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2025-0426</guid><description>Node Denial of Service via kubelet Checkpoint API</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2024-9042</title><link>https://github.com/kubernetes/kubernetes/issues/129654</link><pubDate>Wed, 15 Jan 2025 22:28:29 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2024-9042</guid><description>Command Injection affecting Windows nodes via nodes/*/logs/query API</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2024-10220</title><link>https://github.com/kubernetes/kubernetes/issues/128885</link><pubDate>Wed, 20 Nov 2024 15:30:44 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2024-10220</guid><description>Arbitrary command execution through gitRepo volume</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2024-9594</title><link>https://github.com/kubernetes/kubernetes/issues/128007</link><pubDate>Fri, 11 Oct 2024 18:04:50 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2024-9594</guid><description>VM images built with Image Builder with some providers use default credentials during builds</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2024-9486</title><link>https://github.com/kubernetes/kubernetes/issues/128006</link><pubDate>Fri, 11 Oct 2024 18:04:31 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2024-9486</guid><description>VM images built with Image Builder and Proxmox provider use default credentials</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2024-7646</title><link>https://github.com/kubernetes/kubernetes/issues/126744</link><pubDate>Fri, 16 Aug 2024 16:10:31 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2024-7646</guid><description>Ingress-nginx Annotation Validation Bypass</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2024-7598</title><link>https://github.com/kubernetes/kubernetes/issues/126587</link><pubDate>Wed, 07 Aug 2024 21:30:11 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2024-7598</guid><description>Network restriction bypass via race condition during namespace termination</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2024-5321</title><link>https://github.com/kubernetes/kubernetes/issues/126161</link><pubDate>Wed, 17 Jul 2024 13:06:48 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2024-5321</guid><description>Incorrect permissions on Windows containers logs</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2024-3744</title><link>https://github.com/kubernetes/kubernetes/issues/124759</link><pubDate>Wed, 08 May 2024 16:02:57 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2024-3744</guid><description>azure-file-csi-driver discloses service account tokens in logs</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2024-3177</title><link>https://github.com/kubernetes/kubernetes/issues/124336</link><pubDate>Tue, 16 Apr 2024 14:04:09 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2024-3177</guid><description>Bypassing mountable secrets policy imposed by the ServiceAccount admission plugin</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2023-5528</title><link>https://github.com/kubernetes/kubernetes/issues/121879</link><pubDate>Tue, 14 Nov 2023 15:54:16 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2023-5528</guid><description>Insufficient input sanitization in in-tree storage plugin leads to privilege escalation on Windows nodes</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2023-5044</title><link>https://github.com/kubernetes/kubernetes/issues/126817</link><pubDate>Wed, 25 Oct 2023 15:48:28 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2023-5044</guid><description>Code injection via nginx.ingress.kubernetes.io/permanent-redirect annotation</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2023-5043</title><link>https://github.com/kubernetes/kubernetes/issues/126816</link><pubDate>Wed, 25 Oct 2023 15:48:20 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2023-5043</guid><description>Ingress nginx annotation injection causes arbitrary command execution</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2022-4886</title><link>https://github.com/kubernetes/kubernetes/issues/126815</link><pubDate>Wed, 25 Oct 2023 15:48:08 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2022-4886</guid><description>ingress-nginx path sanitization can be bypassed</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2023-3955</title><link>https://github.com/kubernetes/kubernetes/issues/119595</link><pubDate>Wed, 26 Jul 2023 15:30:50 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2023-3955</guid><description>Insufficient input sanitization on Windows nodes leads to privilege escalation</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2023-3893</title><link>https://github.com/kubernetes/kubernetes/issues/119594</link><pubDate>Wed, 26 Jul 2023 15:30:26 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2023-3893</guid><description>Insufficient input sanitization on kubernetes-csi-proxy leads to privilege escalation</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2023-3676</title><link>https://github.com/kubernetes/kubernetes/issues/119339</link><pubDate>Fri, 14 Jul 2023 18:27:48 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2023-3676</guid><description>Insufficient input sanitization on Windows nodes leads to privilege escalation</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2023-2431</title><link>https://github.com/kubernetes/kubernetes/issues/118690</link><pubDate>Thu, 15 Jun 2023 14:42:32 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2023-2431</guid><description>Bypass of seccomp profile enforcement</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2023-2728</title><link>https://github.com/kubernetes/kubernetes/issues/118640</link><pubDate>Tue, 13 Jun 2023 14:42:06 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2023-2728</guid><description>Bypassing policies imposed by the ImagePolicyWebhook and bypassing mountable secrets policy imposed by the ServiceAccount admission plugin</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2023-2727</title><link>https://github.com/kubernetes/kubernetes/issues/118640</link><pubDate>Tue, 13 Jun 2023 14:42:06 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2023-2727</guid><description>Bypassing policies imposed by the ImagePolicyWebhook and bypassing mountable secrets policy imposed by the ServiceAccount admission plugin</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2023-2878</title><link>https://github.com/kubernetes/kubernetes/issues/118419</link><pubDate>Fri, 02 Jun 2023 19:03:54 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2023-2878</guid><description>secrets-store-csi-driver discloses service account tokens in logs</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2022-3294</title><link>https://github.com/kubernetes/kubernetes/issues/113757</link><pubDate>Tue, 08 Nov 2022 21:33:26 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2022-3294</guid><description>Node address isn&amp;#39;t always verified when proxying</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2022-3162</title><link>https://github.com/kubernetes/kubernetes/issues/113756</link><pubDate>Tue, 08 Nov 2022 21:33:07 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2022-3162</guid><description>Unauthorized read of Custom Resources</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2022-3172</title><link>https://github.com/kubernetes/kubernetes/issues/112513</link><pubDate>Fri, 16 Sep 2022 13:14:50 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2022-3172</guid><description>Aggregated API server can cause clients to be redirected (SSRF)</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2021-25749</title><link>https://github.com/kubernetes/kubernetes/issues/112192</link><pubDate>Thu, 01 Sep 2022 21:02:01 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2021-25749</guid><description>`runAsNonRoot` logic bypass for Windows containers</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2021-25748</title><link>https://github.com/kubernetes/kubernetes/issues/126814</link><pubDate>Fri, 10 Jun 2022 16:01:41 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2021-25748</guid><description>Ingress-nginx `path` sanitization can be bypassed with newline character</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2021-25746</title><link>https://github.com/kubernetes/kubernetes/issues/126813</link><pubDate>Fri, 22 Apr 2022 16:18:27 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2021-25746</guid><description>Ingress-nginx directive injection via annotations</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2021-25745</title><link>https://github.com/kubernetes/kubernetes/issues/126812</link><pubDate>Fri, 22 Apr 2022 16:18:21 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2021-25745</guid><description>Ingress-nginx `path` can be pointed to service account token file</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2021-25742</title><link>https://github.com/kubernetes/kubernetes/issues/126811</link><pubDate>Thu, 21 Oct 2021 16:08:21 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2021-25742</guid><description>Ingress-nginx custom snippets allows retrieval of ingress-nginx serviceaccount token and secrets across all namespaces</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2021-25741</title><link>https://github.com/kubernetes/kubernetes/issues/104980</link><pubDate>Mon, 13 Sep 2021 20:58:56 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2021-25741</guid><description>Symlink Exchange Can Allow Host Filesystem Access</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2021-25737</title><link>https://github.com/kubernetes/kubernetes/issues/102106</link><pubDate>Tue, 18 May 2021 19:14:27 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2021-25737</guid><description>Holes in EndpointSlice Validation Enable Host Network Hijack</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2021-3121</title><link>https://github.com/kubernetes/kubernetes/issues/101435</link><pubDate>Fri, 23 Apr 2021 18:07:32 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2021-3121</guid><description>Processes may panic upon receipt of malicious protobuf messages</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2021-25735</title><link>https://github.com/kubernetes/kubernetes/issues/100096</link><pubDate>Wed, 10 Mar 2021 18:18:01 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2021-25735</guid><description>Validating Admission Webhook does not observe some previous fields</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2020-8554</title><link>https://github.com/kubernetes/kubernetes/issues/97076</link><pubDate>Fri, 04 Dec 2020 20:02:15 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2020-8554</guid><description>Man in the middle using LoadBalancer or ExternalIPs</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2020-8566</title><link>https://github.com/kubernetes/kubernetes/issues/95624</link><pubDate>Thu, 15 Oct 2020 22:07:53 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2020-8566</guid><description>Ceph RBD adminSecrets exposed in logs when loglevel &amp;gt;= 4</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2020-8565</title><link>https://github.com/kubernetes/kubernetes/issues/95623</link><pubDate>Thu, 15 Oct 2020 22:05:32 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2020-8565</guid><description>Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel &amp;gt;= 9</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2020-8564</title><link>https://github.com/kubernetes/kubernetes/issues/95622</link><pubDate>Thu, 15 Oct 2020 22:03:19 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2020-8564</guid><description>Docker config secrets leaked when file is malformed and log level &amp;gt;= 4</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2020-8563</title><link>https://github.com/kubernetes/kubernetes/issues/95621</link><pubDate>Thu, 15 Oct 2020 22:00:44 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2020-8563</guid><description>Secret leaks in kube-controller-manager when using vSphere provider</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2020-8557</title><link>https://github.com/kubernetes/kubernetes/issues/93032</link><pubDate>Mon, 13 Jul 2020 18:39:08 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2020-8557</guid><description>Node disk DOS by writing to container /etc/hosts</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2020-8559</title><link>https://github.com/kubernetes/kubernetes/issues/92914</link><pubDate>Wed, 08 Jul 2020 17:03:16 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2020-8559</guid><description>Privilege escalation from compromised node to cluster</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2020-8558</title><link>https://github.com/kubernetes/kubernetes/issues/92315</link><pubDate>Fri, 19 Jun 2020 18:38:58 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2020-8558</guid><description>Node setting allows for neighboring hosts to bypass localhost boundary</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2020-8555</title><link>https://github.com/kubernetes/kubernetes/issues/91542</link><pubDate>Thu, 28 May 2020 16:13:34 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2020-8555</guid><description>Half-Blind SSRF in kube-controller-manager</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2020-10749</title><link>https://github.com/kubernetes/kubernetes/issues/91507</link><pubDate>Wed, 27 May 2020 19:32:29 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2020-10749</guid><description>IPv4 only clusters susceptible to MitM attacks via IPv6 rogue router advertisements</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2019-11254</title><link>https://github.com/kubernetes/kubernetes/issues/89535</link><pubDate>Thu, 26 Mar 2020 18:55:26 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2019-11254</guid><description>kube-apiserver Denial of Service vulnerability from malicious YAML payloads</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2020-8552</title><link>https://github.com/kubernetes/kubernetes/issues/89378</link><pubDate>Mon, 23 Mar 2020 18:35:34 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2020-8552</guid><description>apiserver DoS (oom)</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2020-8551</title><link>https://github.com/kubernetes/kubernetes/issues/89377</link><pubDate>Mon, 23 Mar 2020 18:34:40 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2020-8551</guid><description>Kubelet DoS via API</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2020-8553</title><link>https://github.com/kubernetes/kubernetes/issues/126818</link><pubDate>Wed, 19 Feb 2020 19:00:32 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2020-8553</guid><description>ingress-nginx auth-type basic annotation vulnerability</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2019-11251</title><link>https://github.com/kubernetes/kubernetes/issues/87773</link><pubDate>Mon, 03 Feb 2020 15:12:22 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2019-11251</guid><description>kubectl cp symlink vulnerability</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2018-1002102</title><link>https://github.com/kubernetes/kubernetes/issues/85867</link><pubDate>Tue, 03 Dec 2019 22:58:37 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2018-1002102</guid><description>Unvalidated redirect</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2019-11255</title><link>https://github.com/kubernetes/kubernetes/issues/85233</link><pubDate>Wed, 13 Nov 2019 20:57:31 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2019-11255</guid><description>CSI volume snapshot, cloning and resizing features can result in unauthorized volume data access or mutation</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2019-11253</title><link>https://github.com/kubernetes/kubernetes/issues/83253</link><pubDate>Fri, 27 Sep 2019 16:53:31 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2019-11253</guid><description>Kubernetes API Server JSON/YAML parsing vulnerable to resource exhaustion attack</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2019-11250</title><link>https://github.com/kubernetes/kubernetes/issues/81114</link><pubDate>Thu, 08 Aug 2019 02:03:04 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2019-11250</guid><description>Bearer tokens are revealed in logs (audit finding TOB-K8S-001)</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2019-11248</title><link>https://github.com/kubernetes/kubernetes/issues/81023</link><pubDate>Tue, 06 Aug 2019 14:34:33 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2019-11248</guid><description>/debug/pprof exposed on kubelet&amp;#39;s healthz port</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2019-11249</title><link>https://github.com/kubernetes/kubernetes/issues/80984</link><pubDate>Mon, 05 Aug 2019 12:44:23 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2019-11249</guid><description>Incomplete fixes for CVE-2019-1002101 and CVE-2019-11246, kubectl cp potential directory traversal</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2019-11247</title><link>https://github.com/kubernetes/kubernetes/issues/80983</link><pubDate>Mon, 05 Aug 2019 12:44:08 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2019-11247</guid><description>API server allows access to custom resources via wrong scope</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2019-11245</title><link>https://github.com/kubernetes/kubernetes/issues/78308</link><pubDate>Fri, 24 May 2019 16:14:49 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2019-11245</guid><description>container uid changes to root after first restart or if image is already pulled to the node</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2019-11243</title><link>https://github.com/kubernetes/kubernetes/issues/76797</link><pubDate>Thu, 18 Apr 2019 21:31:53 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2019-11243</guid><description>rest.AnonymousClientConfig() does not remove the serviceaccount credentials from config created by rest.InClusterConfig()</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2019-11244</title><link>https://github.com/kubernetes/kubernetes/issues/76676</link><pubDate>Tue, 16 Apr 2019 20:14:25 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2019-11244</guid><description>`kubectl --http-cache=&amp;lt;world-accessible dir&amp;gt;` creates world-writeable cached schema files</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2019-1002100</title><link>https://github.com/kubernetes/kubernetes/issues/74534</link><pubDate>Mon, 25 Feb 2019 19:39:09 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2019-1002100</guid><description>json-patch requests can exhaust apiserver resources</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2018-1002105</title><link>https://github.com/kubernetes/kubernetes/issues/71411</link><pubDate>Mon, 26 Nov 2018 11:07:36 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2018-1002105</guid><description>proxy request handling in kube-apiserver can leave vulnerable TCP connections</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2018-1002101</title><link>https://github.com/kubernetes/kubernetes/issues/65750</link><pubDate>Tue, 03 Jul 2018 08:06:15 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2018-1002101</guid><description>smb mount security issue</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2018-1002100</title><link>https://github.com/kubernetes/kubernetes/issues/61297</link><pubDate>Fri, 16 Mar 2018 19:24:46 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2018-1002100</guid><description>Kubectl copy doesn&amp;#39;t check for paths outside of it&amp;#39;s destination directory.</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2017-1002102</title><link>https://github.com/kubernetes/kubernetes/issues/60814</link><pubDate>Mon, 05 Mar 2018 20:55:20 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2017-1002102</guid><description>atomic writer volume handling allows arbitrary file deletion in host filesystem</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2017-1002101</title><link>https://github.com/kubernetes/kubernetes/issues/60813</link><pubDate>Mon, 05 Mar 2018 20:53:58 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2017-1002101</guid><description>subpath volume mount handling allows arbitrary file access in host filesystem</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2017-1002100</title><link>https://github.com/kubernetes/kubernetes/issues/47611</link><pubDate>Thu, 15 Jun 2017 18:59:13 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2017-1002100</guid><description>Azure PV should be Private scope not Container scope</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item><item><title>CVE-2017-1000056</title><link>https://github.com/kubernetes/kubernetes/issues/43459</link><pubDate>Tue, 21 Mar 2017 15:22:29 +0000</pubDate><guid>https://www.cve.org/cverecord?id=CVE-2017-1000056</guid><description>PodSecurityPolicy admission plugin authorizes incorrectly</description><category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status"/></item></channel></rss>