<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">kubernetes-apiserver-1.22.2-21.2 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10901-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">kubernetes-apiserver-1.22.2-21.2 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the kubernetes-apiserver-1.22.2-21.2 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10901</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5195/</URL>
      <Description>SUSE CVE CVE-2016-5195 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8859/</URL>
      <Description>SUSE CVE CVE-2016-8859 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-1002101/</URL>
      <Description>SUSE CVE CVE-2017-1002101 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-1002105/</URL>
      <Description>SUSE CVE CVE-2018-1002105 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11247/</URL>
      <Description>SUSE CVE CVE-2019-11247 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11249/</URL>
      <Description>SUSE CVE CVE-2019-11249 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11253/</URL>
      <Description>SUSE CVE CVE-2019-11253 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9512/</URL>
      <Description>SUSE CVE CVE-2019-9512 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes-apiserver-1.22.2-21.2">
      <FullProductName ProductID="kubernetes-apiserver-1.22.2-21.2">kubernetes-apiserver-1.22.2-21.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes-apiserver-minus1-1.21.5-21.2">
      <FullProductName ProductID="kubernetes-apiserver-minus1-1.21.5-21.2">kubernetes-apiserver-minus1-1.21.5-21.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes-client-1.22.2-21.2">
      <FullProductName ProductID="kubernetes-client-1.22.2-21.2">kubernetes-client-1.22.2-21.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes-controller-manager-1.22.2-21.2">
      <FullProductName ProductID="kubernetes-controller-manager-1.22.2-21.2">kubernetes-controller-manager-1.22.2-21.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes-controller-manager-minus1-1.21.5-21.2">
      <FullProductName ProductID="kubernetes-controller-manager-minus1-1.21.5-21.2">kubernetes-controller-manager-minus1-1.21.5-21.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes-coredns-1.8.4-21.2">
      <FullProductName ProductID="kubernetes-coredns-1.8.4-21.2">kubernetes-coredns-1.8.4-21.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes-coredns-minus1-1.8.0-21.2">
      <FullProductName ProductID="kubernetes-coredns-minus1-1.8.0-21.2">kubernetes-coredns-minus1-1.8.0-21.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes-etcd-3.5.0-21.2">
      <FullProductName ProductID="kubernetes-etcd-3.5.0-21.2">kubernetes-etcd-3.5.0-21.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes-etcd-minus1-3.4.13-21.2">
      <FullProductName ProductID="kubernetes-etcd-minus1-3.4.13-21.2">kubernetes-etcd-minus1-3.4.13-21.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes-kubeadm-1.22.2-21.2">
      <FullProductName ProductID="kubernetes-kubeadm-1.22.2-21.2">kubernetes-kubeadm-1.22.2-21.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes-kubelet-1.22.2-21.2">
      <FullProductName ProductID="kubernetes-kubelet-1.22.2-21.2">kubernetes-kubelet-1.22.2-21.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes-proxy-1.22.2-21.2">
      <FullProductName ProductID="kubernetes-proxy-1.22.2-21.2">kubernetes-proxy-1.22.2-21.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes-proxy-minus1-1.21.5-21.2">
      <FullProductName ProductID="kubernetes-proxy-minus1-1.21.5-21.2">kubernetes-proxy-minus1-1.21.5-21.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes-scheduler-1.22.2-21.2">
      <FullProductName ProductID="kubernetes-scheduler-1.22.2-21.2">kubernetes-scheduler-1.22.2-21.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes-scheduler-minus1-1.21.5-21.2">
      <FullProductName ProductID="kubernetes-scheduler-minus1-1.21.5-21.2">kubernetes-scheduler-minus1-1.21.5-21.2</FullProductName>
    </Branch>
    <Relationship ProductReference="kubernetes-apiserver-1.22.2-21.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2">kubernetes-apiserver-1.22.2-21.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes-apiserver-minus1-1.21.5-21.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2">kubernetes-apiserver-minus1-1.21.5-21.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes-client-1.22.2-21.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2">kubernetes-client-1.22.2-21.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes-controller-manager-1.22.2-21.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2">kubernetes-controller-manager-1.22.2-21.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes-controller-manager-minus1-1.21.5-21.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2">kubernetes-controller-manager-minus1-1.21.5-21.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes-coredns-1.8.4-21.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2">kubernetes-coredns-1.8.4-21.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes-coredns-minus1-1.8.0-21.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2">kubernetes-coredns-minus1-1.8.0-21.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes-etcd-3.5.0-21.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2">kubernetes-etcd-3.5.0-21.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes-etcd-minus1-3.4.13-21.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2">kubernetes-etcd-minus1-3.4.13-21.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes-kubeadm-1.22.2-21.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2">kubernetes-kubeadm-1.22.2-21.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes-kubelet-1.22.2-21.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2">kubernetes-kubelet-1.22.2-21.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes-proxy-1.22.2-21.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2">kubernetes-proxy-1.22.2-21.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes-proxy-minus1-1.21.5-21.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2">kubernetes-proxy-minus1-1.21.5-21.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes-scheduler-1.22.2-21.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2">kubernetes-scheduler-1.22.2-21.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes-scheduler-minus1-1.21.5-21.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2">kubernetes-scheduler-minus1-1.21.5-21.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."</Note>
    </Notes>
    <CVE>CVE-2016-5195</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.6</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5195.html</URL>
        <Description>CVE-2016-5195</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004418</URL>
        <Description>SUSE Bug 1004418</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004419</URL>
        <Description>SUSE Bug 1004419</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004436</URL>
        <Description>SUSE Bug 1004436</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1006323</URL>
        <Description>SUSE Bug 1006323</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1006695</URL>
        <Description>SUSE Bug 1006695</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007291</URL>
        <Description>SUSE Bug 1007291</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008110</URL>
        <Description>SUSE Bug 1008110</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1030118</URL>
        <Description>SUSE Bug 1030118</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1046453</URL>
        <Description>SUSE Bug 1046453</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1069496</URL>
        <Description>SUSE Bug 1069496</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149725</URL>
        <Description>SUSE Bug 1149725</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/870618</URL>
        <Description>SUSE Bug 870618</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986445</URL>
        <Description>SUSE Bug 986445</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998689</URL>
        <Description>SUSE Bug 998689</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple integer overflows in the TRE library and musl libc allow attackers to cause memory corruption via a large number of (1) states or (2) tags, which triggers an out-of-bounds write.</Note>
    </Notes>
    <CVE>CVE-2016-8859</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8859.html</URL>
        <Description>CVE-2016-8859</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005483</URL>
        <Description>SUSE Bug 1005483</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host's filesystem.</Note>
    </Notes>
    <CVE>CVE-2017-1002101</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-1002101.html</URL>
        <Description>CVE-2017-1002101</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1084923</URL>
        <Description>SUSE Bug 1084923</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085007</URL>
        <Description>SUSE Bug 1085007</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085009</URL>
        <Description>SUSE Bug 1085009</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1096726</URL>
        <Description>SUSE Bug 1096726</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connection directly to the backend, authenticated with the Kubernetes API server's TLS credentials used to establish the backend connection.</Note>
    </Notes>
    <CVE>CVE-2018-1002105</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1002105.html</URL>
        <Description>CVE-2018-1002105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118198</URL>
        <Description>SUSE Bug 1118198</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118260</URL>
        <Description>SUSE Bug 1118260</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in this manner are enforced using roles and role bindings within the namespace, meaning that a user with access only to a resource in one namespace could create, view update or delete the cluster-scoped resource (according to their namespace role privileges). Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.</Note>
    </Notes>
    <CVE>CVE-2019-11247</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11247.html</URL>
        <Description>CVE-2019-11247</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1142423</URL>
        <Description>SUSE Bug 1142423</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1142434</URL>
        <Description>SUSE Bug 1142434</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes runs tar inside the container to create a tar archive, copies it over the network, and kubectl unpacks it on the user's machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user's machine when kubectl cp is called, limited only by the system permissions of the local user. Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.1, 1.2, 1.4, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.</Note>
    </Notes>
    <CVE>CVE-2019-11249</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11249.html</URL>
        <Description>CVE-2019-11249</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1144507</URL>
        <Description>SUSE Bug 1144507</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Improper input validation in the Kubernetes API server in versions v1.0-1.12 and versions prior to v1.13.12, v1.14.8, v1.15.5, and v1.16.2 allows authorized users to send malicious YAML or JSON payloads, causing the API server to consume excessive CPU or memory, potentially crashing and becoming unavailable. Prior to v1.14.0, default RBAC policy authorized anonymous users to submit requests that could trigger this vulnerability. Clusters upgraded from a version prior to v1.14.0 keep the more permissive policy by default for backwards compatibility.</Note>
    </Notes>
    <CVE>CVE-2019-11253</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11253.html</URL>
        <Description>CVE-2019-11253</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1152861</URL>
        <Description>SUSE Bug 1152861</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.</Note>
    </Notes>
    <CVE>CVE-2019-9512</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2</ProductID>
        <ProductID>openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9512.html</URL>
        <Description>CVE-2019-9512</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1145663</URL>
        <Description>SUSE Bug 1145663</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146099</URL>
        <Description>SUSE Bug 1146099</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146111</URL>
        <Description>SUSE Bug 1146111</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1147142</URL>
        <Description>SUSE Bug 1147142</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
