CVE Vulnerabilities

CVE-2020-8552

Memory Allocation with Excessive Size Value

Published: Mar 27, 2020 | Modified: Nov 21, 2024
CVSS 3.x
4.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
CVSS 2.x
4 MEDIUM
AV:N/AC:L/Au:S/C:N/I:N/A:P
RedHat/V2
RedHat/V3
4.3 MODERATE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The Kubernetes API server component in versions prior to 1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via successful API requests.

Weakness

The product allocates memory based on an untrusted, large size value, but it does not ensure that the size is within expected limits, allowing arbitrary amounts of memory to be allocated.

Affected Software

NameVendorStart VersionEnd Version
KubernetesKubernetes*1.15.9 (including)
KubernetesKubernetes1.16.0 (including)1.16.6 (including)
KubernetesKubernetes1.17.0 (including)1.17.2 (including)
Red Hat OpenShift Container Platform 3.11RedHatatomic-enterprise-service-catalog-1:3.11.219-1.git.1.717017c.el7*
Red Hat OpenShift Container Platform 3.11RedHatatomic-openshift-0:3.11.219-1.git.0.0c21387.el7*
Red Hat OpenShift Container Platform 3.11RedHatatomic-openshift-cluster-autoscaler-0:3.11.219-1.git.1.1ad3e34.el7*
Red Hat OpenShift Container Platform 3.11RedHatatomic-openshift-descheduler-0:3.11.219-1.git.1.7e5b9ee.el7*
Red Hat OpenShift Container Platform 3.11RedHatatomic-openshift-dockerregistry-0:3.11.219-1.git.1.8323991.el7*
Red Hat OpenShift Container Platform 3.11RedHatatomic-openshift-metrics-server-0:3.11.219-1.git.1.6fe54fb.el7*
Red Hat OpenShift Container Platform 3.11RedHatatomic-openshift-node-problem-detector-0:3.11.219-1.git.1.5ae8753.el7*
Red Hat OpenShift Container Platform 3.11RedHatatomic-openshift-service-idler-0:3.11.219-1.git.1.958cdae.el7*
Red Hat OpenShift Container Platform 3.11RedHatgolang-github-openshift-oauth-proxy-0:3.11.219-1.git.1.076ae14.el7*
Red Hat OpenShift Container Platform 3.11RedHatgolang-github-prometheus-alertmanager-0:3.11.219-1.git.1.9a593f8.el7*
Red Hat OpenShift Container Platform 3.11RedHatgolang-github-prometheus-node_exporter-0:3.11.219-1.git.1.7fa9674.el7*
Red Hat OpenShift Container Platform 3.11RedHatgolang-github-prometheus-prometheus-0:3.11.219-1.git.1.3f6e657.el7*
Red Hat OpenShift Container Platform 3.11RedHatopenshift-ansible-0:3.11.219-1.git.0.8845382.el7*
Red Hat OpenShift Container Platform 3.11RedHatopenshift-enterprise-autoheal-0:3.11.219-1.git.1.c544df9.el7*
Red Hat OpenShift Container Platform 3.11RedHatopenshift-enterprise-cluster-capacity-0:3.11.219-1.git.1.ca1ee51.el7*
Red Hat OpenShift Container Platform 3.11RedHatopenshift-kuryr-0:3.11.219-1.git.1.717d59f.el7*
Red Hat OpenShift Container Platform 3.11RedHatatomic-openshift-0:3.11.248-1.git.0.92ee8ac.el7*
Red Hat OpenShift Container Platform 4.2RedHatopenshift4/ose-hyperkube:v4.2.29-202004140532*
Red Hat OpenShift Container Platform 4.2RedHatopenshift-0:4.2.29-202004120346.git.0.d948116.el7*
Red Hat OpenShift Container Platform 4.2RedHatopenshift4/ose-openshift-apiserver-rhel7:v4.2.34-202005252115*
Red Hat OpenShift Container Platform 4.3RedHatopenshift-0:4.3.9-202003230116.git.0.ebf9a26.el7*
Red Hat OpenShift Container Platform 4.3RedHatopenshift4/ose-hyperkube:v4.3.9-202003230345*
Red Hat OpenShift Container Platform 4.3RedHatopenshift4/ose-openshift-apiserver-rhel7:v4.3.9-202003230345*
KubernetesUbuntueoan*
KubernetesUbuntufocal*
KubernetesUbuntugroovy*
KubernetesUbuntuhirsute*
KubernetesUbuntuimpish*
KubernetesUbuntukinetic*
KubernetesUbuntulunar*
KubernetesUbuntumantic*
KubernetesUbuntuoracular*

Potential Mitigations

References