No analysis available yet.
Vendor Solution
To mitigate these vulnerabilities, upgrade minikube to the latest version and delete any clusters created using an affected version. To delete clusters created using prior versions, run `minikube delete --all`
Vendor Workaround
To continue using an existing cluster, change the default port mappings of the minikube container and restart the docker daemon - docker run -v /var/lib/docker:/var/lib/docker -e MINIKUBE_CONTAINER_ID="$(docker ps --no-trunc -aqf 'name=^minikube$')" -it --entrypoint /bin/sh alpine sed -i 's/0.0.0.0/127.0.0.1/g' /var/lib/docker/containers/$MINIKUBE_CONTAINER_ID/config.v2.json
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-23456 | This vulnerability exposes a network port in minikube running on macOS with Docker driver that could enable unexpected remote access to the minikube container. |
Thu, 16 Jan 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: kubernetes
Published:
Updated: 2025-01-16T20:57:36.573Z
Reserved: 2023-03-03T00:00:00.000Z
Link: CVE-2023-1174
Updated: 2024-08-02T05:40:58.263Z
Status : Modified
Published: 2023-05-24T17:15:09.733
Modified: 2024-11-21T07:38:36.273
Link: CVE-2023-1174
No data.
OpenCVE Enrichment
No data.
EUVD