Skip to content

Commit

Permalink
fixed CVE info
Browse files Browse the repository at this point in the history
  • Loading branch information
daynewlee committed Nov 21, 2024
1 parent b8888c5 commit 16166a8
Showing 1 changed file with 2 additions and 10 deletions.
12 changes: 2 additions & 10 deletions cves/CVE-2024-10220.yaml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
cve: CVE-2024-10220
issueUrl: https://github.com/kubernetes/kubernetes/issues/124531
published: 2024-07-01T00:00Z
issueUrl: https://github.com/kubernetes/kubernetes/issues/128885
published: 2024-11-20T00:00Z
description: |
A security vulnerability was discovered in Kubernetes that could allow a user with the ability to create a pod and associate a gitRepo volume to execute arbitrary commands beyond the container boundary. This vulnerability leverages the hooks folder in the target repository to run arbitrary commands outside of the container's boundary. This issue was originally publicly disclosed with a fix in July (#124531), and we are retroactively assigning it a CVE to assist in awareness and tracking.
components:
Expand All @@ -16,11 +16,3 @@ affected:
fixedBy: "1.29.7"
- range: ">= 1.30, <= 1.30.2"
fixedBy: "1.30.3"
fixedVersions:
- "1.31.0"
- "1.30.3"
- "1.29.7"
- "1.28.12"
mitigation: |
To mitigate this vulnerability, you must upgrade your Kubernetes cluster to one of the fixed versions listed below.
Additionally, since the gitRepo volume has been deprecated, the recommended solution is to perform the Git clone operation using an init container and then mount the directory into the Pod's container. An example of this approach is provided in the Kubernetes documentation.

0 comments on commit 16166a8

Please sign in to comment.