Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-23456 | This vulnerability exposes a network port in minikube running on macOS with Docker driver that could enable unexpected remote access to the minikube container. |
Solution
To mitigate these vulnerabilities, upgrade minikube to the latest version and delete any clusters created using an affected version. To delete clusters created using prior versions, run `minikube delete --all`
Workaround
To continue using an existing cluster, change the default port mappings of the minikube container and restart the docker daemon - docker run -v /var/lib/docker:/var/lib/docker -e MINIKUBE_CONTAINER_ID="$(docker ps --no-trunc -aqf 'name=^minikube$')" -it --entrypoint /bin/sh alpine sed -i 's/0.0.0.0/127.0.0.1/g' /var/lib/docker/containers/$MINIKUBE_CONTAINER_ID/config.v2.json
Thu, 16 Jan 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: kubernetes
Published:
Updated: 2025-01-16T20:57:36.573Z
Reserved: 2023-03-03T00:00:00
Link: CVE-2023-1174
Updated: 2024-08-02T05:40:58.263Z
Status : Modified
Published: 2023-05-24T17:15:09.733
Modified: 2024-11-21T07:38:36.273
Link: CVE-2023-1174
No data.
OpenCVE Enrichment
No data.
EUVD