Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hj2p-8wj8-pfq4

Опубликовано: 23 июн. 2025
Источник: github
Github: Прошло ревью
CVSS3: 2.7

Описание

kubernetes allows nodes to bypass dynamic resource allocation authorization checks

A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation.

Пакеты

Наименование

k8s.io/kubernetes

go
Затронутые версииВерсия исправления

>= 1.32.0, <= 1.32.5

1.32.6

Наименование

k8s.io/kubernetes

go
Затронутые версииВерсия исправления

>= 1.33.0, <= 1.33.1

1.33.2

EPSS

Процентиль: 5%
0.00024
Низкий

2.7 Low

CVSS3

Дефекты

CWE-863

Связанные уязвимости

CVSS3: 2.7
ubuntu
2 месяца назад

A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation.

CVSS3: 2.7
redhat
2 месяца назад

A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation.

CVSS3: 2.7
nvd
2 месяца назад

A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation.

CVSS3: 2.7
debian
2 месяца назад

A vulnerability exists in the NodeRestriction admission controller whe ...

EPSS

Процентиль: 5%
0.00024
Низкий

2.7 Low

CVSS3

Дефекты

CWE-863