Total vulnerabilities in the database
In Kubernetes clusters using a logging level of at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. This affects < v1.19.3, < v1.18.10, < v1.17.13.
Software | From | Fixed in |
---|---|---|
kubernetes / kubernetes | 1.19.0 | 1.19.3 |
kubernetes / kubernetes | 1.18.0 | 1.18.10 |
kubernetes / kubernetes | 1.17.0 | 1.17.13 |
![]() |
1.19.0 | 1.19.3 |
![]() |
1.18.0 | 1.18.10 |
![]() |
- | 1.17.13 |
![]() |
- | 1.20.0-alpha.1 |