CVE-2019-11247

Priority
Description
The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped
custom resource if the request is made as if the resource were namespaced.
Authorizations for the resource accessed in this manner are enforced using
roles and role bindings within the namespace, meaning that a user with
access only to a resource in one namespace could create, view update or
delete the cluster-scoped resource (according to their namespace role
privileges). Kubernetes affected versions include versions prior to 1.13.9,
versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.7, 1.8,
1.9, 1.10, 1.11, 1.12.
Notes
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 19.04 (Disco Dingo):not-affected
Ubuntu 19.10 (Eoan Ermine):not-affected
More Information

Updated: 2019-12-05 21:09:38 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)