File tree 4 files changed +136
-24
lines changed
4 files changed +136
-24
lines changed Original file line number Diff line number Diff line change 7
7
" CVE-2023-3955" ,
8
8
" GHSA-q78c-gwqw-jcmc"
9
9
],
10
- "summary" : " Kubernetes privilege escalation vulnerability in k8s.io/kubernetes" ,
11
- "details" : " Kubernetes privilege escalation vulnerability in k8s.io/kubernetes " ,
10
+ "summary" : " Insufficient input sanitization on Windows nodes leads to privilege escalation in k8s.io/kubernetes and k8s.io/mount-utils " ,
11
+ "details" : " A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes. " ,
12
12
"affected" : [
13
13
{
14
14
"package" : {
52
52
]
53
53
}
54
54
],
55
- "ecosystem_specific" : {}
55
+ "ecosystem_specific" : {
56
+ "imports" : [
57
+ {
58
+ "path" : " k8s.io/kubernetes/pkg/volume/util" ,
59
+ "goos" : [
60
+ " windows"
61
+ ],
62
+ "symbols" : [
63
+ " WriteVolumeCache"
64
+ ]
65
+ }
66
+ ]
67
+ }
68
+ },
69
+ {
70
+ "package" : {
71
+ "name" : " k8s.io/mount-utils" ,
72
+ "ecosystem" : " Go"
73
+ },
74
+ "ranges" : [
75
+ {
76
+ "type" : " SEMVER" ,
77
+ "events" : [
78
+ {
79
+ "introduced" : " 0"
80
+ },
81
+ {
82
+ "fixed" : " 0.24.17"
83
+ },
84
+ {
85
+ "introduced" : " 0.25.0"
86
+ },
87
+ {
88
+ "fixed" : " 0.25.13"
89
+ },
90
+ {
91
+ "introduced" : " 0.26.0"
92
+ },
93
+ {
94
+ "fixed" : " 0.26.8"
95
+ },
96
+ {
97
+ "introduced" : " 0.27.0"
98
+ },
99
+ {
100
+ "fixed" : " 0.27.5"
101
+ },
102
+ {
103
+ "introduced" : " 0.28.0"
104
+ },
105
+ {
106
+ "fixed" : " 0.28.1"
107
+ }
108
+ ]
109
+ }
110
+ ],
111
+ "ecosystem_specific" : {
112
+ "imports" : [
113
+ {
114
+ "path" : " k8s.io/mount-utils" ,
115
+ "goos" : [
116
+ " windows"
117
+ ],
118
+ "symbols" : [
119
+ " SafeFormatAndMount.formatAndMountSensitive" ,
120
+ " listVolumesOnDisk"
121
+ ]
122
+ }
123
+ ]
124
+ }
56
125
}
57
126
],
58
127
"references" : [
59
128
{
60
129
"type" : " ADVISORY" ,
61
130
"url" : " https://github.com/advisories/GHSA-q78c-gwqw-jcmc"
62
131
},
63
- {
64
- "type" : " ADVISORY" ,
65
- "url" : " https://nvd.nist.gov/vuln/detail/CVE-2023-3955"
66
- },
67
132
{
68
133
"type" : " WEB" ,
69
134
"url" : " https://github.com/kubernetes/kubernetes/commit/38c97fa67ed35f36e730856728c9e3807f63546a"
119
184
],
120
185
"database_specific" : {
121
186
"url" : " https://pkg.go.dev/vuln/GO-2023-2170" ,
122
- "review_status" : " UNREVIEWED "
187
+ "review_status" : " REVIEWED "
123
188
}
124
189
}
Original file line number Diff line number Diff line change 7
7
" CVE-2023-3676" ,
8
8
" GHSA-7fxm-f474-hf8w"
9
9
],
10
- "summary" : " Kubernetes privilege escalation vulnerability in k8s.io/kubernetes" ,
11
- "details" : " Kubernetes privilege escalation vulnerability in k8s.io/kubernetes " ,
10
+ "summary" : " Insufficient input sanitization on Windows nodes leads to privilege escalation in k8s.io/kubernetes" ,
11
+ "details" : " A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes. " ,
12
12
"affected" : [
13
13
{
14
14
"package" : {
52
52
]
53
53
}
54
54
],
55
- "ecosystem_specific" : {}
55
+ "ecosystem_specific" : {
56
+ "imports" : [
57
+ {
58
+ "path" : " k8s.io/kubernetes/pkg/volume/util/subpath" ,
59
+ "goos" : [
60
+ " windows"
61
+ ],
62
+ "symbols" : [
63
+ " evalSymlink" ,
64
+ " getUpperPath"
65
+ ]
66
+ }
67
+ ]
68
+ }
56
69
}
57
70
],
58
71
"references" : [
59
72
{
60
73
"type" : " ADVISORY" ,
61
74
"url" : " https://github.com/advisories/GHSA-7fxm-f474-hf8w"
62
75
},
63
- {
64
- "type" : " ADVISORY" ,
65
- "url" : " https://nvd.nist.gov/vuln/detail/CVE-2023-3676"
66
- },
67
76
{
68
77
"type" : " WEB" ,
69
78
"url" : " https://github.com/kubernetes/kubernetes/commit/073f9ea33a93ddaecdc2e829150fb715f6387399"
123
132
],
124
133
"database_specific" : {
125
134
"url" : " https://pkg.go.dev/vuln/GO-2023-2330" ,
126
- "review_status" : " UNREVIEWED "
135
+ "review_status" : " REVIEWED "
127
136
}
128
137
}
Original file line number Diff line number Diff line change @@ -12,14 +12,42 @@ modules:
12
12
- introduced : 1.28.0
13
13
- fixed : 1.28.1
14
14
vulnerable_at : 1.28.0
15
- summary : Kubernetes privilege escalation vulnerability in k8s.io/kubernetes
15
+ packages :
16
+ - package : k8s.io/kubernetes/pkg/volume/util
17
+ goos :
18
+ - windows
19
+ symbols :
20
+ - WriteVolumeCache
21
+ - module : k8s.io/mount-utils
22
+ versions :
23
+ - fixed : 0.24.17
24
+ - introduced : 0.25.0
25
+ - fixed : 0.25.13
26
+ - introduced : 0.26.0
27
+ - fixed : 0.26.8
28
+ - introduced : 0.27.0
29
+ - fixed : 0.27.5
30
+ - introduced : 0.28.0
31
+ - fixed : 0.28.1
32
+ vulnerable_at : 0.28.0
33
+ packages :
34
+ - package : k8s.io/mount-utils
35
+ goos :
36
+ - windows
37
+ symbols :
38
+ - SafeFormatAndMount.formatAndMountSensitive
39
+ - listVolumesOnDisk
40
+ summary : Insufficient input sanitization on Windows nodes leads to privilege escalation in k8s.io/kubernetes and k8s.io/mount-utils
41
+ description : |-
42
+ A security issue was discovered in Kubernetes where a user that can create pods
43
+ on Windows nodes may be able to escalate to admin privileges on those nodes.
44
+ Kubernetes clusters are only affected if they include Windows nodes.
16
45
cves :
17
46
- CVE-2023-3955
18
47
ghsas :
19
48
- GHSA-q78c-gwqw-jcmc
20
49
references :
21
50
- advisory : https://github.com/advisories/GHSA-q78c-gwqw-jcmc
22
- - advisory : https://nvd.nist.gov/vuln/detail/CVE-2023-3955
23
51
- web : https://github.com/kubernetes/kubernetes/commit/38c97fa67ed35f36e730856728c9e3807f63546a
24
52
- web : https://github.com/kubernetes/kubernetes/commit/50334505cd27cbe7cf71865388f25a00e29b2596
25
53
- web : https://github.com/kubernetes/kubernetes/commit/7da6d72c05dffb3b87e62e2bc8c3228ea12ba1b9
@@ -35,6 +63,6 @@ references:
35
63
- web : https://groups.google.com/g/kubernetes-security-announce/c/JrX4bb7d83E
36
64
source :
37
65
id : GHSA-q78c-gwqw-jcmc
38
- created : 2024-08-20T12:12:15.292286-04 :00
39
- review_status : UNREVIEWED
66
+ created : 2024-12-12T14:41:27.794119-05 :00
67
+ review_status : REVIEWED
40
68
unexcluded : EFFECTIVELY_PRIVATE
Original file line number Diff line number Diff line change @@ -12,14 +12,24 @@ modules:
12
12
- introduced : 1.28.0
13
13
- fixed : 1.28.1
14
14
vulnerable_at : 1.28.0
15
- summary : Kubernetes privilege escalation vulnerability in k8s.io/kubernetes
15
+ packages :
16
+ - package : k8s.io/kubernetes/pkg/volume/util/subpath
17
+ goos :
18
+ - windows
19
+ symbols :
20
+ - getUpperPath
21
+ - evalSymlink
22
+ summary : Insufficient input sanitization on Windows nodes leads to privilege escalation in k8s.io/kubernetes
23
+ description : |-
24
+ A security issue was discovered in Kubernetes where a user that can create pods
25
+ on Windows nodes may be able to escalate to admin privileges on those nodes.
26
+ Kubernetes clusters are only affected if they include Windows nodes.
16
27
cves :
17
28
- CVE-2023-3676
18
29
ghsas :
19
30
- GHSA-7fxm-f474-hf8w
20
31
references :
21
32
- advisory : https://github.com/advisories/GHSA-7fxm-f474-hf8w
22
- - advisory : https://nvd.nist.gov/vuln/detail/CVE-2023-3676
23
33
- web : https://github.com/kubernetes/kubernetes/commit/073f9ea33a93ddaecdc2e829150fb715f6387399
24
34
- web : https://github.com/kubernetes/kubernetes/commit/39cc101c7855341c651a943b9836b50fbace8a6b
25
35
- web : https://github.com/kubernetes/kubernetes/commit/74b617310c24ca84c2ec90c3858af745d65b5226
@@ -36,6 +46,6 @@ references:
36
46
- web : https://security.netapp.com/advisory/ntap-20231130-0007
37
47
source :
38
48
id : GHSA-7fxm-f474-hf8w
39
- created : 2024-08-20T12:14:41.740115-04 :00
40
- review_status : UNREVIEWED
49
+ created : 2024-12-12T15:03:43.614919-05 :00
50
+ review_status : REVIEWED
41
51
unexcluded : EFFECTIVELY_PRIVATE
You can’t perform that action at this time.
0 commit comments