Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: python312Packages.kubernetes

Found 1 matching suggestions

View:
Compact
Detailed
Untriaged
Permalink CVE-2022-3248
4.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 6 months, 1 week ago
Openshift api admission checks does not enforce "custom-host" permissions

A flaw was found in OpenShift API, as admission checks do not enforce "custom-host" permissions. This issue could allow an attacker to violate the boundaries, as permissions will not be applied.

References

Affected products

openshift
kubernetes
atomic-openshift
openshift-clients
rhacm2/agent-service-rhel8

Matching in nixpkgs

pkgs.openshift

Build, deploy, and manage your applications with Docker and Kubernetes

  • nixos-unstable -

pkgs.kubernetes

Production-Grade Container Scheduling and Management

  • nixos-unstable -

pkgs.kubernetes-kcp

Kubernetes-like control planes for form-factors and use-cases beyond Kubernetes and container workloads

  • nixos-unstable -

pkgs.kubernetes-polaris

Validate and remediate Kubernetes resources to ensure configuration best practices are followed

  • nixos-unstable -

pkgs.kubernetes-validate

Module to validate Kubernetes resource definitions against the declared Kubernetes schemas

  • nixos-unstable -

Package maintainers