{"id":1153,"date":"2024-10-22T17:53:42","date_gmt":"2024-10-22T15:53:42","guid":{"rendered":"https:\/\/ayrilys.com\/?p=1153"},"modified":"2024-10-22T17:53:47","modified_gmt":"2024-10-22T15:53:47","slug":"une-faille-critique-pointee-dans-kubernetes-image-builder","status":"publish","type":"post","link":"https:\/\/ayrilys.com\/index.php\/une-faille-critique-pointee-dans-kubernetes-image-builder\/","title":{"rendered":"Une faille critique point\u00e9e dans Kubernetes Image Builder"},"content":{"rendered":"\n<p class=\"has-medium-font-size\"><strong>Une faille critique point\u00e9e dans Kubernetes Image Builder<\/strong><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>R\u00e9sum\u00e9 de l&rsquo;article :<\/strong><\/p>\n\n\n\n<p>Un probl\u00e8me de s\u00e9curit\u00e9 critique a \u00e9t\u00e9 d\u00e9couvert dans&nbsp;<strong>Kubernetes Image Builder<\/strong>. Les informations d\u2019identification par d\u00e9faut sont activ\u00e9es pendant le processus de construction de l\u2019image, ce qui permet aux pirates d\u2019obtenir un acc\u00e8s administrateur \u00e0 un syst\u00e8me cible. Cette vuln\u00e9rabilit\u00e9, identifi\u00e9e comme&nbsp;<strong>CVE-2024-9486<\/strong>, affecte particuli\u00e8rement les clusters Kubernetes utilisant des VM cr\u00e9\u00e9es via Image Builder sur&nbsp;<strong>Proxmox<\/strong>.<\/p>\n\n\n\n<p>Les utilisateurs de Kubernetes Image Builder version&nbsp;<strong>v0.1.37<\/strong>&nbsp;ou ant\u00e9rieure doivent \u00eatre vigilants. Les images de VM construites avec cet outil peuvent \u00eatre accessibles via les identifiants par d\u00e9faut, ouvrant la voie \u00e0 un acc\u00e8s root. Les clusters utilisant des VM sur Proxmox sont les plus \u00e0 risque, avec un score CVSS de&nbsp;<strong>9.8<\/strong>.<\/p>\n\n\n\n<p>Pour att\u00e9nuer cette faille, il est recommand\u00e9 de :<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Mettre \u00e0 jour<\/strong>\u00a0vers une version fixe d\u2019Image Builder.<\/li>\n\n\n\n<li><strong>Recr\u00e9er et red\u00e9ployer<\/strong>\u00a0toutes les images affect\u00e9es.<\/li>\n\n\n\n<li><strong>D\u00e9sactiver le compte builder<\/strong>\u00a0sur les VM concern\u00e9es avec la commande\u00a0<code>usermod -L builder<\/code>.<\/li>\n<\/ol>\n\n\n\n<p>Les machines virtuelles utilisant d\u2019autres fournisseurs comme VMware ESXi ou vSphere ne sont pas affect\u00e9es par cette vuln\u00e9rabilit\u00e9 sp\u00e9cifique.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>D\u00e9tail de l&rsquo;article :<\/strong><\/p>\n\n\n\n<p>Un probl\u00e8me de s\u00e9curit\u00e9 a \u00e9t\u00e9 d\u00e9couvert dans Kubernetes Image Builder o\u00f9 les informations d&rsquo;identification par d\u00e9faut sont activ\u00e9es pendant le processus de construction de l&rsquo;image. Un exploit qui donne la possibilit\u00e9 aux pirates d&rsquo;obtenir un acc\u00e8s administrateur \u00e0 un syst\u00e8me cible.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000099355.png\" alt=\"Les clusters Kubernetes dont les n\u0153uds utilisant des VM cr\u00e9\u00e9es via Image Builder sur Proxmox sont vuln\u00e9rables \u00e0 la faille critique CVE-2024-9486. (cr\u00e9dit : OVH)\" title=\"Les clusters Kubernetes dont les n\u0153uds utilisant des VM cr\u00e9\u00e9es via Image Builder sur Proxmox sont vuln\u00e9rables \u00e0 la faille critique CVE-2024-9486. (cr\u00e9dit : OVH)\"\/><figcaption class=\"wp-element-caption\">Les clusters Kubernetes dont les n\u0153uds utilisant des VM cr\u00e9\u00e9es via Image Builder sur Proxmox sont vuln\u00e9rables \u00e0 la faille critique CVE-2024-9486. (cr\u00e9dit : OVH)<\/figcaption><\/figure>\n\n\n\n<p>Les utilisateurs recourant \u00e0 des clusters utilisant des images de VM construites avec Kubernetes Image Builder version v0.1.37 ou ant\u00e9rieure doivent s&rsquo;inqui\u00e9ter.&nbsp;Un gros souci de s\u00e9curit\u00e9&nbsp;<a href=\"https:\/\/discuss.kubernetes.io\/t\/security-advisory-cve-2024-9486-and-cve-2024-9594-vm-images-built-with-kubernetes-image-builder-use-default-credentials\/30119\" target=\"_blank\" rel=\"noreferrer noopener\">a \u00e9t\u00e9 d\u00e9couvert<\/a>&nbsp;dans cet outil permettant de construire des images K8&rsquo;s : les informations d&rsquo;identification par d\u00e9faut sont activ\u00e9es pendant le processus de construction de l&rsquo;image. \u00ab\u00a0Les images de machines virtuelles construites \u00e0 l&rsquo;aide du fournisseur Proxmox ne d\u00e9sactivent pas ces informations d&rsquo;identification par d\u00e9faut, et les n\u0153uds utilisant les images r\u00e9sultantes peuvent \u00eatre accessibles via ces informations d&rsquo;identification par d\u00e9faut\u00a0\u00bb, pr\u00e9vient le Nist (National Institute of Standards and Technology) du d\u00e9partement du Commerce am\u00e9ricain.<\/p>\n\n\n\n<p>Ce trou de s\u00e9curit\u00e9 ouvre la voie \u00e0 un acc\u00e8s root via l&rsquo;utilisation de ces identifiants. A noter que&nbsp;les clusters Kubernetes dont les n\u0153uds utilisant des VM cr\u00e9\u00e9es via Image Builder sur Proxmox (et son hyperviseur bas\u00e9 sur KVM) sont les plus \u00e0 risques, la faille&nbsp;<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-9486\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-9486<\/a>&nbsp;\u00e9tant class\u00e9e critique (score CVSS 9.8). Pour les machines virtuelles con\u00e7ues, d\u00e9ploy\u00e9es ou g\u00e9r\u00e9es avec Nutanix, OVA (open virtual machine format), QEMU (logiciel de virtualisation et \u00e9mulateur open source) ou raw device mapping (m\u00e9canisme permettant \u00e0 une&nbsp;VM d&rsquo;avoir un acc\u00e8s direct \u00e0 un LUN sur le sous-syst\u00e8me de stockage physique), ne sont pas concern\u00e9es par ce probl\u00e8me la vuln\u00e9rabilit\u00e9 (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-9594\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-9594<\/a>) est \u00e0 risque mod\u00e9r\u00e9 (score CVSS 6.3). Pour ces derniers, le risque est r\u00e9el si un attaquant est capable d&rsquo;atteindre la machine virtuelle o\u00f9 la construction de l&rsquo;image a lieu et exploite la vuln\u00e9rabilit\u00e9 pour modifier l&rsquo;image au moment o\u00f9 la construction de l&rsquo;image a lieu.&nbsp;Les machines virtuelles utilisant des images cr\u00e9\u00e9es par d&rsquo;autres fournisseurs &#8211; VMware ESXi ou vSphere par exemple &#8211; ne sont pas affect\u00e9es.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-une-mesure-d-attenuation-possible\">Une mesure d&rsquo;att\u00e9nuation possible<\/h2>\n\n\n\n<p>Pour att\u00e9nuer cette faille &#8211; si une mont\u00e9e de version n&rsquo;est pas possible &#8211; une mesure d&rsquo;att\u00e9nuation consiste \u00e0 reconstruire toutes les images affect\u00e9es en utilisant une version fixe d&rsquo;Image Builder. Red\u00e9ployez les images corrig\u00e9es sur toutes les&nbsp;VM affect\u00e9es. Avant la mise \u00e0 jour, cette vuln\u00e9rabilit\u00e9 peut \u00eatre att\u00e9nu\u00e9e en d\u00e9sactivant le compte builder sur les machines virtuelles concern\u00e9es : usermod -L builder.<\/p>\n\n\n\n<p>Une erreur dans l&rsquo;article?<a href=\"https:\/\/www.lemondeinformatique.fr\/divers\/formulaire_contact_lmi.php?id=1&amp;type=lmi&amp;arti=95020\">Proposez-nous une correction<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/images.itnewsinfo.com\/idg\/auteur\/moyen\/000000006958.jpg\" alt=\"\"\/><\/figure>\n\n\n\n<p>Article r\u00e9dig\u00e9 par<\/p>\n\n\n\n<p><a href=\"https:\/\/www.lemondeinformatique.fr\/actualites\/auteur-dominique-filippone-484.html\">Dominique Filippone<\/a><\/p>\n\n\n\n<p>Chef des actualit\u00e9s LMI<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Une faille critique point\u00e9e dans Kubernetes Image Builder R\u00e9sum\u00e9 de l&rsquo;article : Un probl\u00e8me de s\u00e9curit\u00e9 critique a \u00e9t\u00e9 d\u00e9couvert dans&nbsp;Kubernetes Image Builder. Les informations d\u2019identification par d\u00e9faut sont activ\u00e9es pendant le processus de construction de l\u2019image, ce qui permet aux pirates d\u2019obtenir un acc\u00e8s administrateur \u00e0 un syst\u00e8me cible. Cette vuln\u00e9rabilit\u00e9, identifi\u00e9e comme&nbsp;CVE-2024-9486, affecte&#8230;<\/p>\n","protected":false},"author":1,"featured_media":1148,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_kadence_starter_templates_imported_post":false,"_kad_post_transparent":"","_kad_post_title":"hide","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":true,"token":"eyJpbWciOiJodHRwczpcL1wvYXlyaWx5cy5jb21cL3dwLWNvbnRlbnRcL3VwbG9hZHNcLzIwMjRcLzEwXC9UcmFmZmljLUludGVybmV0LXN0cmVldC1zY2VuZS13aXRoLWxpZ2h0LXRyYWlscy1mcm9tLWNpdHktbGlnaHRzLmpwZWciLCJ0eHQiOiJVbmUgZmFpbGxlIGNyaXRpcXVlIHBvaW50XHUwMGU5ZSBkYW5zIEt1YmVybmV0ZXMgSW1hZ2UgQnVpbGRlciIsInRlbXBsYXRlIjoiaGlnaHdheSIsImJsb2dfaWQiOjIzNTMzNTAyM30.7VXGtmdkc5j6_SmZPFkuL0WxS0Icfiiotut6bqRUxrMMQ"},"version":2}},"categories":[20,22],"tags":[],"class_list":["post-1153","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-accueil","category-securite-informatique"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.8 (Yoast SEO v26.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Cybers\u00e9curit\u00e9 PME : Alertes sur une faille critique dans Kubernetes Image Builder Prestataire informatique depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -<\/title>\r\n<meta name=\"description\" content=\"D\u00e9couvrez la faille critique dans Kubernetes Image Builder. Mettez \u00e0 jour pour prot\u00e9ger votre syst\u00e8me contre les attaques de piratage.\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/ayrilys.com\/index.php\/une-faille-critique-pointee-dans-kubernetes-image-builder\/\" \/>\r\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Une faille critique point\u00e9e dans Kubernetes Image Builder\" \/>\r\n<meta property=\"og:description\" content=\"Une faille critique point\u00e9e dans Kubernetes Image Builder Prestataire informatique depuis 2003 pour les PME\/PMI\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/ayrilys.com\/index.php\/une-faille-critique-pointee-dans-kubernetes-image-builder\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Prestataire informatique depuis 2003 pour les PME\/PMI\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=61563219240658\" \/>\r\n<meta property=\"article:published_time\" content=\"2024-10-22T15:53:42+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2024-10-22T15:53:47+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/Traffic-Internet-street-scene-with-light-trails-from-city-lights.jpeg\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1\" \/>\r\n\t<meta property=\"og:image:height\" content=\"1\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\r\n<meta name=\"author\" content=\"admin\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@Ayrilys165097\" \/>\r\n<meta name=\"twitter:site\" content=\"@Ayrilys165097\" \/>\r\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/une-faille-critique-pointee-dans-kubernetes-image-builder\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/une-faille-critique-pointee-dans-kubernetes-image-builder\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94\"},\"headline\":\"Une faille critique point\u00e9e dans Kubernetes Image Builder\",\"datePublished\":\"2024-10-22T15:53:42+00:00\",\"dateModified\":\"2024-10-22T15:53:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/une-faille-critique-pointee-dans-kubernetes-image-builder\/\"},\"wordCount\":734,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ayrilys.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/une-faille-critique-pointee-dans-kubernetes-image-builder\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/Traffic-Internet-street-scene-with-light-trails-from-city-lights.jpeg\",\"articleSection\":[\"Accueil\",\"S\u00e9curit\u00e9 informatique\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ayrilys.com\/index.php\/une-faille-critique-pointee-dans-kubernetes-image-builder\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/une-faille-critique-pointee-dans-kubernetes-image-builder\/\",\"url\":\"https:\/\/ayrilys.com\/index.php\/une-faille-critique-pointee-dans-kubernetes-image-builder\/\",\"name\":\"Cybers\u00e9curit\u00e9 PME : Alertes sur une faille critique dans Kubernetes Image Builder Prestataire informatique depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -\",\"isPartOf\":{\"@id\":\"https:\/\/ayrilys.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/une-faille-critique-pointee-dans-kubernetes-image-builder\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/une-faille-critique-pointee-dans-kubernetes-image-builder\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/Traffic-Internet-street-scene-with-light-trails-from-city-lights.jpeg\",\"datePublished\":\"2024-10-22T15:53:42+00:00\",\"dateModified\":\"2024-10-22T15:53:47+00:00\",\"description\":\"D\u00e9couvrez la faille critique dans Kubernetes Image Builder. Mettez \u00e0 jour pour prot\u00e9ger votre syst\u00e8me contre les attaques de piratage.\",\"breadcrumb\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/une-faille-critique-pointee-dans-kubernetes-image-builder\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ayrilys.com\/index.php\/une-faille-critique-pointee-dans-kubernetes-image-builder\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/une-faille-critique-pointee-dans-kubernetes-image-builder\/#primaryimage\",\"url\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/Traffic-Internet-street-scene-with-light-trails-from-city-lights.jpeg\",\"contentUrl\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/Traffic-Internet-street-scene-with-light-trails-from-city-lights.jpeg\",\"caption\":\"Night traffic speeds through the illuminated cityscape ,generative artificial intelligence\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/une-faille-critique-pointee-dans-kubernetes-image-builder\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/ayrilys.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Une faille critique point\u00e9e dans Kubernetes Image Builder\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ayrilys.com\/#website\",\"url\":\"https:\/\/ayrilys.com\/\",\"name\":\"Ayrilys prestataire informatique infog\u00e9rance PME TPE MSP depuis 2003 sur Viroflay\",\"description\":\"Prestataire informatique PME TPE sur Viroflay en ile de France depuis plus de 20 ans\",\"publisher\":{\"@id\":\"https:\/\/ayrilys.com\/#organization\"},\"alternateName\":\"Ayriliys infog\u00e9rance fournisseur de services manag\u00e9s MSP PME TPE Viroflay\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ayrilys.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ayrilys.com\/#organization\",\"name\":\"Ayrilys\",\"url\":\"https:\/\/ayrilys.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png\",\"contentUrl\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png\",\"width\":119,\"height\":64,\"caption\":\"Ayrilys\"},\"image\":{\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/profile.php?id=61563219240658\",\"https:\/\/x.com\/Ayrilys165097\"],\"description\":\"Prestataire informatique depuis plus de 20 ans pour les PME et TPE\",\"email\":\"ayrilys@ayrilys.com\",\"telephone\":\"+33139242197\",\"legalName\":\"Ayrilys\",\"foundingDate\":\"2003-01-01\",\"vatID\":\"FR90449159011\",\"taxID\":\"44915901100013\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1\",\"maxValue\":\"10\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/ayrilys.com\"],\"url\":\"https:\/\/ayrilys.com\/index.php\/author\/admin\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybers\u00e9curit\u00e9 PME : Alertes sur une faille critique dans Kubernetes Image Builder Prestataire informatique depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -","description":"D\u00e9couvrez la faille critique dans Kubernetes Image Builder. Mettez \u00e0 jour pour prot\u00e9ger votre syst\u00e8me contre les attaques de piratage.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ayrilys.com\/index.php\/une-faille-critique-pointee-dans-kubernetes-image-builder\/","og_locale":"fr_FR","og_type":"article","og_title":"Une faille critique point\u00e9e dans Kubernetes Image Builder","og_description":"Une faille critique point\u00e9e dans Kubernetes Image Builder Prestataire informatique depuis 2003 pour les PME\/PMI","og_url":"https:\/\/ayrilys.com\/index.php\/une-faille-critique-pointee-dans-kubernetes-image-builder\/","og_site_name":"Prestataire informatique depuis 2003 pour les PME\/PMI","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=61563219240658","article_published_time":"2024-10-22T15:53:42+00:00","article_modified_time":"2024-10-22T15:53:47+00:00","og_image":[{"url":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/Traffic-Internet-street-scene-with-light-trails-from-city-lights.jpeg","width":1,"height":1,"type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@Ayrilys165097","twitter_site":"@Ayrilys165097","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ayrilys.com\/index.php\/une-faille-critique-pointee-dans-kubernetes-image-builder\/#article","isPartOf":{"@id":"https:\/\/ayrilys.com\/index.php\/une-faille-critique-pointee-dans-kubernetes-image-builder\/"},"author":{"name":"admin","@id":"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94"},"headline":"Une faille critique point\u00e9e dans Kubernetes Image Builder","datePublished":"2024-10-22T15:53:42+00:00","dateModified":"2024-10-22T15:53:47+00:00","mainEntityOfPage":{"@id":"https:\/\/ayrilys.com\/index.php\/une-faille-critique-pointee-dans-kubernetes-image-builder\/"},"wordCount":734,"commentCount":0,"publisher":{"@id":"https:\/\/ayrilys.com\/#organization"},"image":{"@id":"https:\/\/ayrilys.com\/index.php\/une-faille-critique-pointee-dans-kubernetes-image-builder\/#primaryimage"},"thumbnailUrl":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/Traffic-Internet-street-scene-with-light-trails-from-city-lights.jpeg","articleSection":["Accueil","S\u00e9curit\u00e9 informatique"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ayrilys.com\/index.php\/une-faille-critique-pointee-dans-kubernetes-image-builder\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ayrilys.com\/index.php\/une-faille-critique-pointee-dans-kubernetes-image-builder\/","url":"https:\/\/ayrilys.com\/index.php\/une-faille-critique-pointee-dans-kubernetes-image-builder\/","name":"Cybers\u00e9curit\u00e9 PME : Alertes sur une faille critique dans Kubernetes Image Builder Prestataire informatique depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -","isPartOf":{"@id":"https:\/\/ayrilys.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ayrilys.com\/index.php\/une-faille-critique-pointee-dans-kubernetes-image-builder\/#primaryimage"},"image":{"@id":"https:\/\/ayrilys.com\/index.php\/une-faille-critique-pointee-dans-kubernetes-image-builder\/#primaryimage"},"thumbnailUrl":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/Traffic-Internet-street-scene-with-light-trails-from-city-lights.jpeg","datePublished":"2024-10-22T15:53:42+00:00","dateModified":"2024-10-22T15:53:47+00:00","description":"D\u00e9couvrez la faille critique dans Kubernetes Image Builder. Mettez \u00e0 jour pour prot\u00e9ger votre syst\u00e8me contre les attaques de piratage.","breadcrumb":{"@id":"https:\/\/ayrilys.com\/index.php\/une-faille-critique-pointee-dans-kubernetes-image-builder\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ayrilys.com\/index.php\/une-faille-critique-pointee-dans-kubernetes-image-builder\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ayrilys.com\/index.php\/une-faille-critique-pointee-dans-kubernetes-image-builder\/#primaryimage","url":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/Traffic-Internet-street-scene-with-light-trails-from-city-lights.jpeg","contentUrl":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/Traffic-Internet-street-scene-with-light-trails-from-city-lights.jpeg","caption":"Night traffic speeds through the illuminated cityscape ,generative artificial intelligence"},{"@type":"BreadcrumbList","@id":"https:\/\/ayrilys.com\/index.php\/une-faille-critique-pointee-dans-kubernetes-image-builder\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/ayrilys.com\/"},{"@type":"ListItem","position":2,"name":"Une faille critique point\u00e9e dans Kubernetes Image Builder"}]},{"@type":"WebSite","@id":"https:\/\/ayrilys.com\/#website","url":"https:\/\/ayrilys.com\/","name":"Ayrilys prestataire informatique infog\u00e9rance PME TPE MSP depuis 2003 sur Viroflay","description":"Prestataire informatique PME TPE sur Viroflay en ile de France depuis plus de 20 ans","publisher":{"@id":"https:\/\/ayrilys.com\/#organization"},"alternateName":"Ayriliys infog\u00e9rance fournisseur de services manag\u00e9s MSP PME TPE Viroflay","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ayrilys.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/ayrilys.com\/#organization","name":"Ayrilys","url":"https:\/\/ayrilys.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/","url":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png","contentUrl":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png","width":119,"height":64,"caption":"Ayrilys"},"image":{"@id":"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=61563219240658","https:\/\/x.com\/Ayrilys165097"],"description":"Prestataire informatique depuis plus de 20 ans pour les PME et TPE","email":"ayrilys@ayrilys.com","telephone":"+33139242197","legalName":"Ayrilys","foundingDate":"2003-01-01","vatID":"FR90449159011","taxID":"44915901100013","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1","maxValue":"10"}},{"@type":"Person","@id":"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94","name":"admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ayrilys.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/ayrilys.com"],"url":"https:\/\/ayrilys.com\/index.php\/author\/admin\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/Traffic-Internet-street-scene-with-light-trails-from-city-lights.jpeg","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts\/1153","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/comments?post=1153"}],"version-history":[{"count":1,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts\/1153\/revisions"}],"predecessor-version":[{"id":1154,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts\/1153\/revisions\/1154"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/media\/1148"}],"wp:attachment":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/media?parent=1153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/categories?post=1153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/tags?post=1153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}