UBUNTU-CVE-2018-1002100

Source
https://ubuntu.com/security/CVE-2018-1002100
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-1002100.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2018-1002100
Upstream
Withdrawn
2025-08-28T16:59:01Z
Published
2018-06-02T01:29:00Z
Modified
2025-07-14T06:59:56.330424Z
Severity
  • 4.2 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:N CVSS Calculator
  • 5.5 (Medium) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

In Kubernetes versions 1.5.x, 1.6.x, 1.7.x, 1.8.x, and prior to version 1.9.6, the kubectl cp command insecurely handles tar data returned from the container, and can be caused to overwrite arbitrary local files.

References

Affected packages

Ubuntu:Pro:20.04:LTS / kubernetes

Package

Name
kubernetes
Purl
pkg:deb/ubuntu/kubernetes@1.0?arch=source&distro=esm-apps/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.0

Ubuntu:22.04:LTS / kubernetes

Package

Name
kubernetes
Purl
pkg:deb/ubuntu/kubernetes@1.0?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.0

Ubuntu:24.04:LTS / kubernetes

Package

Name
kubernetes
Purl
pkg:deb/ubuntu/kubernetes@1.0?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.0