DescriptionCloud Native Computing Foundation (CNCF) CNI (Container Networking Interface) 0.7.4 has a network firewall misconfiguration which affects Kubernetes. The CNI 'portmap' plugin, used to setup HostPorts for CNI, inserts rules at the front of the iptables nat chains; which take precedence over the KUBE- SERVICES chain. Because of this, the HostPort/portmap rule could match incoming traffic even if there were better fitting, more specific service definition rules like NodePorts later in the chain. The issue is fixed in CNI 0.7.5 and Kubernetes 1.11.9, 1.12.7, 1.13.5, and 1.14.0.
Overall state of this security issue: Pending
This issue is currently rated as having moderate severity.
|National Vulnerability Database|
|National Vulnerability Database||SUSE|
Status of this issue by product and package
Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.
|Magnum Orchestration||kubernetes||Not affected|
|SUSE CaaS Platform 3.0||kubernetes||Affected|
|SUSE CaaS Platform 4.0||kubernetes||Not affected|
|SUSE Container as a Service Platform 1.0||kubernetes||Affected|
|SUSE Container as a Service Platform 2.0||kubernetes||Not affected|
|SUSE Linux Enterprise 12 Module for Public Cloud||kubernetes||Not affected|
|SUSE Linux Enterprise 15-SP1 Module for Containers||kubernetes||Not affected|