Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2021-25749, CVE-2023-3676, CVE-2023-3955, CVE-2024-3177 #21

Merged
merged 1 commit into from
Apr 18, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
19 changes: 19 additions & 0 deletions cves/CVE-2021-25749.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
cve: CVE-2021-25749
issueUrl: https://github.com/kubernetes/kubernetes/issues/112192
published: 2022-09-15T00:00Z
description: A security issue was discovered in Kubernetes that could allow Windows workloads to run as ContainerAdministrator even when those workloads set the runAsNonRoot option to true.
components:
- kubelet
cvss:
kubernetes:
scoreV3: 7.8
vectorV3: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
affected:
- range: ">= 1.20, <= 1.22.13"
fixedBy: "1.22.14"
- range: ">= 1.23.0, <= 1.23.10"
fixedBy: "1.23.11"
- range: ">= 1.24.0, <= 1.24.4"
fixedBy: "1.24.5"
- range: ">= 1.25, < 1.25.0"
fixedBy: "1.25.0"
Comment on lines +18 to +19

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is it worth mentioning 1.25.0 at all? Seems like 1.25 is not affected.

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

eh. The issue explicitly calls out 1.25.0 as being a fixed version, so interpret that as meaning something like 1.25.0-alpha may be affected. I think it's ok as-is

21 changes: 21 additions & 0 deletions cves/CVE-2023-3676.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
cve: CVE-2023-3676
issueUrl: https://github.com/kubernetes/kubernetes/issues/119339
published: 2023-07-14T00:00Z
description: A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes.
components:
- kubelet
cvss:
kubernetes:
scoreV3: 8.8
vectorV3: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
affected:
- range: "<= 1.24.16"
fixedBy: "1.24.17"
- range: ">= 1.25, <= 1.25.12"
fixedBy: "1.25.13"
- range: ">= 1.26, <= 1.26.7"
fixedBy: "1.26.8"
- range: ">= 1.27, <= 1.27.4"
fixedBy: "1.27.5"
- range: ">= 1.28, < 1.28.1"
fixedBy: "1.28.1"
21 changes: 21 additions & 0 deletions cves/CVE-2023-3955.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
cve: CVE-2023-3955
issueUrl: https://github.com/kubernetes/kubernetes/issues/119595
published: 2023-07-14T00:00Z
description: A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes.
components:
- kubelet
cvss:
kubernetes:
scoreV3: 8.8
vectorV3: CVSS:3.1/av:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
affected:
- range: "<= 1.24.16"
fixedBy: "1.24.17"
- range: ">= 1.25, <= 1.25.12"
fixedBy: "1.25.13"
- range: ">= 1.26, <= 1.26.7"
fixedBy: "1.26.8"
- range: ">= 1.27, <= 1.27.4"
fixedBy: "1.27.5"
- range: ">= 1.28, < 1.28.1"
fixedBy: "1.28.1"
18 changes: 18 additions & 0 deletions cves/CVE-2024-3177.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
cve: CVE-2024-3177
issueUrl: https://github.com/kubernetes/kubernetes/issues/124336
published: 2024-04-16T00:00Z
description: |
A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using containers, init containers, and ephemeral containers with the envFrom field populated. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the kubernetes.io/enforce-mountable-secrets annotation are used together with containers, init containers, and ephemeral containers with the envFrom field populated.
components:
- kube-apiserver
cvss:
kubernetes:
scoreV3: 2.7
vectorV3: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
affected:
- range: "<= 1.27.12"
fixedBy: "1.27.13"
- range: ">= 1.28, <= 1.28.8"
fixedBy: "1.28.9"
- range: ">= 1.29, <= 1.29.3"
fixedBy: "1.29.4"
Loading