Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upCVE-2017-1002101 - subpath volume mount handling allows arbitrary file access in host filesystem #60813
Comments
liggitt
self-assigned this
Mar 5, 2018
k8s-ci-robot
added
the
needs-sig
label
Mar 5, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
k8s-ci-robot
Mar 5, 2018
Contributor
@liggitt: There are no sig labels on this issue. Please add a sig label.
A sig label can be added by either:
-
mentioning a sig:
@kubernetes/sig-<group-name>-<group-suffix>
e.g.,@kubernetes/sig-contributor-experience-<group-suffix>to notify the contributor experience sig, OR -
specifying the label manually:
/sig <group-name>
e.g.,/sig scalabilityto apply thesig/scalabilitylabel
Note: Method 1 will trigger an email to the group. See the group list.
The <group-suffix> in method 1 has to be replaced with one of these: bugs, feature-requests, pr-reviews, test-failures, proposals
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.
|
@liggitt: There are no sig labels on this issue. Please add a sig label. A sig label can be added by either:
Note: Method 1 will trigger an email to the group. See the group list. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
liggitt
added
sig/release
and removed
needs-sig
labels
Mar 5, 2018
liggitt
closed this
Mar 5, 2018
This was referenced Mar 12, 2018
liggitt
reopened this
Mar 12, 2018
liggitt
changed the title from
<placeholder>
to
CVE-2017-1002101
Mar 12, 2018
liggitt
added
kind/bug
priority/critical-urgent
area/security
sig/storage
status/approved-for-milestone
and removed
sig/release
labels
Mar 12, 2018
liggitt
added this to the v1.10 milestone
Mar 12, 2018
k8s-merge-robot
added
the
milestone/needs-attention
label
Mar 12, 2018
liggitt
added
the
status/in-progress
label
Mar 12, 2018
liggitt
assigned
jsafrane and
msau42
Mar 12, 2018
k8s-merge-robot
removed
the
milestone/needs-attention
label
Mar 12, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
k8s-merge-robot
Mar 12, 2018
Contributor
[MILESTONENOTIFIER] Milestone Issue: Up-to-date for process
Note: This issue is marked as priority/critical-urgent, and must be updated every 1 day during code freeze.
Example update:
ACK. In progress
ETA: DD/MM/YYYY
Risks: Complicated fix required
Issue Labels
sig/storage: Issue will be escalated to these SIGs if needed.priority/critical-urgent: Never automatically move issue out of a release milestone; continually escalate to contributor and SIG through all available channels.kind/bug: Fixes a bug discovered during the current release.
|
[MILESTONENOTIFIER] Milestone Issue: Up-to-date for process Note: This issue is marked as Example update:
Issue Labels
|
k8s-merge-robot
closed this
in
#61044
Mar 12, 2018
added a commit
that referenced
this issue
Mar 12, 2018
liggitt
changed the title from
CVE-2017-1002101
to
CVE-2017-1002101 - subpath volume mount handling allows arbitrary file access in host filesystem
Mar 12, 2018
Silvenga
referenced this issue
Mar 13, 2018
Closed
"CreateContainerConfigError: failed to prepare subPath for volumeMount" error with configMap volume #61076
andyzhangx
referenced this issue
Mar 16, 2018
Closed
CVE-2017-1002101 & CVE-2017-1002102 patch eta? #248
vincent99
referenced this issue
Mar 23, 2018
Closed
Create new k8s builds due to subPath regression in Kubernetes 1.8.9 and 1.9.4 #12178
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
dc70184
Mar 23, 2018
This article states that:
•Kubernetes 1.7.0-1.7.13
Does this mean all versions between 1.7.0 and 1.17.13 are vulnerable? For example, is 1.17.6 vulnerable?
dc70184
commented
Mar 23, 2018
|
This article states that: Does this mean all versions between 1.7.0 and 1.17.13 are vulnerable? For example, is 1.17.6 vulnerable? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
anything between 1.7.0 and 1.7.13 are vulnerable, including 1.7.6 |
liggitt commentedMar 5, 2018
•
edited
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
This vulnerability allows containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) to access files/directories outside of the volume, including the host’s filesystem.
Thanks to Maxim Ivanov for reporting this problem.
Vulnerable versions:
Vulnerable configurations:
Vulnerability impact:
A specially crafted pod spec combined with malicious container behavior can allow read/write access to arbitrary files outside volumes specified in the pod, including the host’s filesystem. This can be accomplished with any volume type, including emptyDir, and can be accomplished with a non-privileged pod (subject to file permissions).
Mitigations prior to upgrading:
Prevent untrusted users from creating pods (and pod-creating objects like deployments, replicasets, etc), or disable all volume types with PodSecurityPolicy (note that this prevents use of service account tokens in pods, and requires use of
automountServiceAccountToken: false)Fixed versions:
Action Required:
In addition to upgrading, PodSecurityPolicy objects designed to limit container permissions must completely disable hostPath volumes, as the allowedHostPaths feature does not restrict symlink creation and traversal. Future enhancements (tracked in issue #61043) are required to limit hostPath use to read only volumes or exact path matches before a PodSecurityPolicy can effectively restrict hostPath usage to a given subpath.
Known issues: