CVE Vulnerabilities

CVE-2020-8557

Uncontrolled Resource Consumption

Published: Jul 23, 2020 | Modified: Nov 21, 2024
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
2.1 LOW
AV:L/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
5.5 MODERATE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM

The Kubernetes kubelet component in versions 1.1-1.16.12, 1.17.0-1.17.8 and 1.18.0-1.18.5 do not account for disk usage by a pod which writes to its own /etc/hosts file. The /etc/hosts file mounted in a pod by kubelet is not included by the kubelet eviction manager when calculating ephemeral storage usage by a pod. If a pod writes a large amount of data to the /etc/hosts file, it could fill the storage space of the node and cause the node to fail.

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

Name Vendor Start Version End Version
Kubernetes Kubernetes * 1.16.13 (excluding)
Kubernetes Kubernetes 1.17.0 (including) 1.17.9 (excluding)
Kubernetes Kubernetes 1.18.0 (including) 1.18.6 (excluding)
Red Hat OpenShift Container Platform 3.11 RedHat atomic-openshift-0:3.11.542-1.git.0.f2fd300.el7 *
Red Hat OpenShift Container Platform 4.3 RedHat openshift4/ose-hyperkube:v4.3.37-202009151447.p0 *
Red Hat OpenShift Container Platform 4.3 RedHat openshift-0:4.3.37-202009120213.p0.git.0.dffefe4.el8 *
Red Hat OpenShift Container Platform 4.4 RedHat openshift-0:4.4.0-202008250319.p0.git.0.d653415.el8 *
Red Hat OpenShift Container Platform 4.4 RedHat openshift4/ose-hyperkube:v4.4.0-202008250319.p0 *
Red Hat OpenShift Container Platform 4.5 RedHat openshift-0:4.5.0-202008130146.p0.git.0.aaf1d57.el8 *
Red Hat OpenShift Container Platform 4.5 RedHat openshift4/ose-hyperkube:v4.5.0-202008130146.p0 *
Kubernetes Ubuntu eoan *
Kubernetes Ubuntu focal *
Kubernetes Ubuntu groovy *
Kubernetes Ubuntu hirsute *
Kubernetes Ubuntu impish *
Kubernetes Ubuntu kinetic *
Kubernetes Ubuntu lunar *
Kubernetes Ubuntu mantic *
Kubernetes Ubuntu oracular *

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References