MGASA-2024-0389 - Updated kubernetes kubernetes packages fix security vulnerabilities

Publication date: 06 Dec 2024
URL: https://advisories.mageia.org/MGASA-2024-0389.html
Type: security
Affected Mageia releases: 9
CVE: CVE-2024-3177,
     CVE-2024-10220

A security issue was discovered in Kubernetes where users may be able to
launch containers that bypass the mountable secrets policy enforced by
the ServiceAccount admission plugin when using containers, init
containers, and ephemeral containers with the envFrom field populated.
The policy ensures pods running with a service account may only
reference secrets specified in the service account’s secrets field.
Kubernetes clusters are only affected if the ServiceAccount admission
plugin and the kubernetes.io/enforce-mountable-secrets annotation are
used together with containers, init containers, and ephemeral containers
with the envFrom field populated. CVE-2024-3177
The Kubernetes kubelet component allows arbitrary command execution via
specially crafted gitRepo volumes. CVE-2024-10220

References:
- https://bugs.mageia.org/show_bug.cgi?id=33143
- https://bugs.mageia.org/show_bug.cgi?id=33802
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WL54MTLGMTBZZO5PYGEGEBERTMADC4WC/
- https://www.openwall.com/lists/oss-security/2024/11/20/1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3177
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10220

SRPMS:
- 9/core/kubernetes-1.27.16-2.mga9

Mageia 2024-0389: kubernetes kubernetes Security Advisory Updates

A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin ...

Summary

A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using containers, init containers, and ephemeral containers with the envFrom field populated. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the kubernetes.io/enforce-mountable-secrets annotation are used together with containers, init containers, and ephemeral containers with the envFrom field populated. CVE-2024-3177 The Kubernetes kubelet component allows arbitrary command execution via specially crafted gitRepo volumes. CVE-2024-10220

References

- https://bugs.mageia.org/show_bug.cgi?id=33143

- https://bugs.mageia.org/show_bug.cgi?id=33802

- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WL54MTLGMTBZZO5PYGEGEBERTMADC4WC/

- https://www.openwall.com/lists/oss-security/2024/11/20/1

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3177

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10220

Resolution

MGASA-2024-0389 - Updated kubernetes kubernetes packages fix security vulnerabilities

SRPMS

- 9/core/kubernetes-1.27.16-2.mga9

Severity
Publication date: 06 Dec 2024
URL: https://advisories.mageia.org/MGASA-2024-0389.html
Type: security
CVE: CVE-2024-3177, CVE-2024-10220

Related News