{"id":"CVE-2019-9946","details":"Cloud Native Computing Foundation (CNCF) CNI (Container Networking Interface) 0.7.4 has a network firewall misconfiguration which affects Kubernetes. The CNI 'portmap' plugin, used to setup HostPorts for CNI, inserts rules at the front of the iptables nat chains; which take precedence over the KUBE- SERVICES chain. Because of this, the HostPort/portmap rule could match incoming traffic even if there were better fitting, more specific service definition rules like NodePorts later in the chain. The issue is fixed in CNI 0.7.5 and Kubernetes 1.11.9, 1.12.7, 1.13.5, and 1.14.0.","modified":"2026-04-11T12:23:59.405728Z","published":"2019-04-02T18:30:26.583Z","related":["openSUSE-SU-2024:10884-1"],"database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:a:kubernetes:kubernetes:1.13.6:beta0:*:*:*:*:*:*","extracted_events":[{"last_affected":"1.13.6-beta0"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha0:*:*:*:*:*:*","extracted_events":[{"last_affected":"1.14.0-alpha0"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha1:*:*:*:*:*:*","extracted_events":[{"last_affected":"1.14.0-alpha1"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha2:*:*:*:*:*:*","extracted_events":[{"last_affected":"1.14.0-alpha2"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha3:*:*:*:*:*:*","extracted_events":[{"last_affected":"1.14.0-alpha3"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:kubernetes:kubernetes:1.14.0:beta0:*:*:*:*:*:*","extracted_events":[{"last_affected":"1.14.0-beta0"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:kubernetes:kubernetes:1.14.0:beta1:*:*:*:*:*:*","extracted_events":[{"last_affected":"1.14.0-beta1"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:kubernetes:kubernetes:1.14.0:beta2:*:*:*:*:*:*","extracted_events":[{"last_affected":"1.14.0-beta2"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:kubernetes:kubernetes:1.14.0:rc1:*:*:*:*:*:*","extracted_events":[{"last_affected":"1.14.0-rc1"}],"source":"CPE_FIELD"}]},"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FCN66VYB3XS76SYH567SO7N3I254JOCT/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGOOWAELGH3F7OXRBPH3HCNZELNLXYTW/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHBA-2019:0862"},{"type":"FIX","url":"https://github.com/containernetworking/plugins/pull/269#issuecomment-477683272"},{"type":"FIX","url":"https://security.netapp.com/advisory/ntap-20190416-0002/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/containernetworking/plugins","events":[{"introduced":"0"},{"fixed":"a62711a5da7a2dc2eb93eac47e103738ad923fd6"}],"database_specific":{"cpe":"cpe:2.3:a:cncf:portmap:*:*:*:*:*:container_networking_interface:*:*","extracted_events":[{"introduced":"0"},{"fixed":"0.7.5"}],"source":"CPE_FIELD"}}],"versions":["v0.6.0","v0.6.0-rc1","v0.6.0-rc2","v0.7.0","v0.7.0-rc1","v0.7.0-rc2","v0.7.1","v0.7.2","v0.7.3","v0.7.4"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-9946.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/kubernetes/kubernetes","events":[{"introduced":"0"},{"fixed":"16236ce91790d4c75b79f6ce96841db1c843e7d2"},{"introduced":"0ed33881dc4355495f623c6f22e7dd0b7632b7c0"},{"fixed":"6f482974b76db3f1e0f5d24605a9d1d38fad9a2b"},{"introduced":"ddf47ac13c1a9483ea035a79cd7c10005ff21a6d"},{"fixed":"2166946f41b36dea2c4626f90a77706f426cdea2"}],"database_specific":{"cpe":"cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"fixed":"1.11.9"},{"introduced":"1.12.0"},{"fixed":"1.12.7"},{"introduced":"1.13.0"},{"fixed":"1.13.5"}],"source":"CPE_FIELD"}}],"versions":["v0.13.1-dev","v0.17.0","v1.1.0-alpha.0","v1.1.0-alpha.1","v1.10.0-alpha.0","v1.10.0-alpha.1","v1.10.0-alpha.2","v1.10.0-alpha.3","v1.11.0","v1.11.0-alpha.0","v1.11.0-alpha.1","v1.11.0-alpha.2","v1.11.0-beta.0","v1.11.0-beta.1","v1.11.0-beta.2","v1.11.0-rc.1","v1.11.0-rc.2","v1.11.0-rc.3","v1.11.1","v1.11.1-beta.0","v1.11.2","v1.11.2-beta.0","v1.11.3","v1.11.3-beta.0","v1.11.4","v1.11.4-beta.0","v1.11.5","v1.11.5-beta.0","v1.11.6","v1.11.6-beta.0","v1.11.7","v1.11.7-beta.0","v1.11.8","v1.11.8-beta.0","v1.11.9-beta.0","v1.12.0","v1.12.0-alpha.0","v1.12.1","v1.12.1-beta.0","v1.12.2","v1.12.2-beta.0","v1.12.3","v1.12.3-beta.0","v1.12.4","v1.12.4-beta.0","v1.12.5","v1.12.5-beta.0","v1.12.6","v1.12.6-beta.0","v1.12.7-beta.0","v1.13.0","v1.13.1","v1.13.1-beta.0","v1.13.2","v1.13.2-beta.0","v1.13.3","v1.13.3-beta.0","v1.13.4","v1.13.4-beta.0","v1.13.5-beta.0","v1.2.0-alpha.1","v1.2.0-alpha.2","v1.2.0-alpha.3","v1.2.0-alpha.4","v1.2.0-alpha.5","v1.2.0-alpha.6","v1.2.0-alpha.7","v1.2.0-alpha.8","v1.3.0-alpha.0","v1.3.0-alpha.1","v1.3.0-alpha.2","v1.3.0-alpha.3","v1.3.0-alpha.4","v1.3.0-alpha.5","v1.4.0-alpha.1","v1.4.0-alpha.2","v1.4.0-alpha.3","v1.5.0-alpha.0","v1.5.0-alpha.1","v1.5.0-alpha.2","v1.6.0-alpha.0","v1.6.0-alpha.1","v1.6.0-alpha.2","v1.6.0-alpha.3","v1.7.0-alpha.0","v1.7.0-alpha.1","v1.7.0-alpha.2","v1.7.0-alpha.3","v1.7.0-alpha.4","v1.8.0-alpha.0","v1.8.0-alpha.1","v1.8.0-alpha.2","v1.8.0-alpha.3","v1.9.0-alpha.0","v1.9.0-alpha.1","v1.9.0-alpha.2","v1.9.0-alpha.3"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-9946.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}