跳转到帖子

Red Hat OpenShift: CVE-2024-3177: kubernetes: kube-apiserver: bypassing mountable secrets policy imposed by the ServiceAccount admission plugin

recommended_posts

发布于
  • Members

Red Hat OpenShift: CVE-2024-3177: kubernetes: kube-apiserver: bypassing mountable secrets policy imposed by the ServiceAccount admission plugin

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
04/22/2024
Created
06/28/2024
Added
06/28/2024
Modified
10/10/2024

Description

A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using containers, init containers, and ephemeral containers with the envFrom field populated. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the kubernetes.io/enforce-mountable-secrets annotation are used together with containers, init containers, and ephemeral containers with the envFrom field populated.

Solution(s)

  • linuxrpm-upgrade-microshift
  • linuxrpm-upgrade-openshift

References

  • https://attackerkb.com/topics/cve-2024-3177
  • CVE - 2024-3177
  • RHSA-2024:0043
  • RHSA-2024:2054
  • 查看数 700
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…