Show plain JSON{"containers": {"cna": {"affected": [{"product": "CSI Snapshotter", "vendor": "Kubernetes", "versions": [{"lessThanOrEqual": "v3.0.1", "status": "affected", "version": "snapshot-controller v3.0", "versionType": "custom"}, {"lessThanOrEqual": "v2.1.2", "status": "affected", "version": "snapshot-controller v2.1", "versionType": "custom"}]}], "credits": [{"lang": "en", "value": "Qin Ping"}], "datePublic": "2020-11-17T00:00:00", "descriptions": [{"lang": "en", "value": "Kubernetes CSI snapshot-controller prior to v2.1.3 and v3.0.2 could panic when processing a VolumeSnapshot custom resource when: - The VolumeSnapshot referenced a non-existing PersistentVolumeClaim and the VolumeSnapshot did not reference any VolumeSnapshotClass. - The snapshot-controller crashes, is automatically restarted by Kubernetes, and processes the same VolumeSnapshot custom resource after the restart, entering an endless crashloop. Only the volume snapshot feature is affected by this vulnerability. When exploited, users can\u2019t take snapshots of their volumes or delete the snapshots. All other Kubernetes functionality is not affected."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2021-01-21T17:09:21", "orgId": "a6081bf6-c852-4425-ad4f-a67919267565", "shortName": "kubernetes"}, "references": [{"tags": ["x_refsource_MISC"], "url": "https://groups.google.com/g/kubernetes-security-announce/c/1EzCr1qUxxU"}, {"tags": ["x_refsource_MISC"], "url": "https://github.com/kubernetes-csi/external-snapshotter/issues/380"}], "source": {"defect": ["https://github.com/kubernetes-csi/external-snapshotter/issues/380"], "discovery": "INTERNAL"}, "title": "Kubernetes CSI snapshot-controller DoS", "workarounds": [{"lang": "en", "value": "Prior to upgrading, this vulnerability can be mitigated by restricting creation of VolumeSnapshot custom resources in API group snapshot.storage.k8s.io only to trusted users."}], "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "security@kubernetes.io", "DATE_PUBLIC": "2020-11-17T21:00:00.000Z", "ID": "CVE-2020-8569", "STATE": "PUBLIC", "TITLE": "Kubernetes CSI snapshot-controller DoS"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "CSI Snapshotter", "version": {"version_data": [{"version_affected": "<=", "version_name": "snapshot-controller v3.0", "version_value": "v3.0.1"}, {"version_affected": "<=", "version_name": "snapshot-controller v2.1", "version_value": "v2.1.2"}]}}]}, "vendor_name": "Kubernetes"}]}}, "credit": [{"lang": "eng", "value": "Qin Ping"}], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "Kubernetes CSI snapshot-controller prior to v2.1.3 and v3.0.2 could panic when processing a VolumeSnapshot custom resource when: - The VolumeSnapshot referenced a non-existing PersistentVolumeClaim and the VolumeSnapshot did not reference any VolumeSnapshotClass. - The snapshot-controller crashes, is automatically restarted by Kubernetes, and processes the same VolumeSnapshot custom resource after the restart, entering an endless crashloop. Only the volume snapshot feature is affected by this vulnerability. When exploited, users can\u2019t take snapshots of their volumes or delete the snapshots. All other Kubernetes functionality is not affected."}]}, "generator": {"engine": "Vulnogram 0.0.9"}, "impact": {"cvss": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-476 NULL Pointer Dereference"}]}]}, "references": {"reference_data": [{"name": "https://groups.google.com/g/kubernetes-security-announce/c/1EzCr1qUxxU", "refsource": "MISC", "url": "https://groups.google.com/g/kubernetes-security-announce/c/1EzCr1qUxxU"}, {"name": "https://github.com/kubernetes-csi/external-snapshotter/issues/380", "refsource": "MISC", "url": "https://github.com/kubernetes-csi/external-snapshotter/issues/380"}]}, "source": {"defect": ["https://github.com/kubernetes-csi/external-snapshotter/issues/380"], "discovery": "INTERNAL"}, "work_around": [{"lang": "en", "value": "Prior to upgrading, this vulnerability can be mitigated by restricting creation of VolumeSnapshot custom resources in API group snapshot.storage.k8s.io only to trusted users."}]}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-04T10:03:46.107Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://groups.google.com/g/kubernetes-security-announce/c/1EzCr1qUxxU"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://github.com/kubernetes-csi/external-snapshotter/issues/380"}]}]}, "cveMetadata": {"assignerOrgId": "a6081bf6-c852-4425-ad4f-a67919267565", "assignerShortName": "kubernetes", "cveId": "CVE-2020-8569", "datePublished": "2021-01-21T17:09:21.567240Z", "dateReserved": "2020-02-03T00:00:00", "dateUpdated": "2024-09-17T01:47:07.863Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}