CVE Vulnerabilities

CVE-2020-8551

Memory Allocation with Excessive Size Value

Published: Mar 27, 2020 | Modified: Nov 21, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
3.3 LOW
AV:A/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
4.3 MODERATE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Ubuntu
MEDIUM

The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on port 10250.

Weakness

The product allocates memory based on an untrusted, large size value, but it does not ensure that the size is within expected limits, allowing arbitrary amounts of memory to be allocated.

Affected Software

Name Vendor Start Version End Version
Kubernetes Kubernetes 1.15.0 (including) 1.15.9 (including)
Kubernetes Kubernetes 1.16.0 (including) 1.16.6 (including)
Kubernetes Kubernetes 1.17.0 (including) 1.17.2 (including)
Red Hat OpenShift Container Platform 4.3 RedHat openshift-0:4.3.10-202003300855.git.0.da48c1d.el8 *
Red Hat OpenShift Container Platform 4.3 RedHat openshift4/ose-hyperkube:v4.3.10-202003311925 *

Potential Mitigations

References