Improper Certificate Validation Affecting kubernetes package, versions <1.5.5+dfsg-1


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.35% (73rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-KUBERNETES-269168
  • published27 Jun 2018
  • disclosed10 Sept 2018

Introduced: 27 Jun 2018

CVE-2016-7075  (opens in a new tab)
CWE-295  (opens in a new tab)

How to fix?

Upgrade Debian:unstable kubernetes to version 1.5.5+dfsg-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kubernetes package and not the kubernetes package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

It was found that Kubernetes as used by Openshift Enterprise 3 did not correctly validate X.509 client intermediate certificate host name fields. An attacker could use this flaw to bypass authentication requirements by using a specially crafted X.509 certificate.