Open
Description
The efk
addon contains the image k8s.gcr.io/elasticsearch:v5.6.2@sha256:7e95b32a7a2aad0c0db5c881e4a1ce8b7e53236144ae9d9cfb5fbe5608af4ab2
This image contains Log4j CVEs
✗ Remote Code Execution (RCE) [Critical Severity][https://security.snyk.io/vuln/SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2314720] in org.apache.logging.log4j:[email protected]
introduced by org.apache.logging.log4j:[email protected]
✗ Remote Code Execution (RCE) [Critical Severity][https://security.snyk.io/vuln/SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2320014] in org.apache.logging.log4j:[email protected]
introduced by org.apache.logging.log4j:[email protected]
If you are using the addon we recommend you run minikube addons disable efk
to terminate the vulnerable pod.
If you are not using the efk
addon you are not vulnerable.
- Prevent users from enabling the addon (Prevent enabling
efk
addon due to containing Log4j CVE #15281) - Look into updating the images
- Allow re-enabling the addon