Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-7598

Опубликовано: 20 мар. 2025
Источник: redhat
CVSS3: 3.1
EPSS Низкий

Описание

A security issue was discovered in Kubernetes where a malicious or compromised pod could bypass network restrictions enforced by network policies during namespace deletion. The order in which objects are deleted during namespace termination is not defined, and it is possible for network policies to be deleted before the pods that they protect. This can lead to a brief period in which the pods are running, but network policies that should apply to connections to and from the pods are not enforced.

A flaw was found in Kubernetes. This vulnerability can allow a malicious or compromised pod to bypass network restrictions via the deletion of network policies before pod termination during namespace deletion.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 4openshiftFix deferred
Red Hat OpenShift Container Platform 4openshift4/ose-hyperkube-rhel9Fix deferred
Red Hat OpenShift Container Platform 4openshift4/ose-kube-proxyFix deferred
Red Hat OpenShift Container Platform 4ose-installer-kube-apiserver-artifacts-containerFix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-362
https://bugzilla.redhat.com/show_bug.cgi?id=2353913kube-apiserver: Network restriction bypass via race condition during namespace termination

EPSS

Процентиль: 10%
0.00048
Низкий

3.1 Low

CVSS3

Связанные уязвимости

CVSS3: 3.1
ubuntu
8 месяцев назад

A security issue was discovered in Kubernetes where a malicious or compromised pod could bypass network restrictions enforced by network policies during namespace deletion. The order in which objects are deleted during namespace termination is not defined, and it is possible for network policies to be deleted before the pods that they protect. This can lead to a brief period in which the pods are running, but network policies that should apply to connections to and from the pods are not enforced.

CVSS3: 3.1
nvd
8 месяцев назад

A security issue was discovered in Kubernetes where a malicious or compromised pod could bypass network restrictions enforced by network policies during namespace deletion. The order in which objects are deleted during namespace termination is not defined, and it is possible for network policies to be deleted before the pods that they protect. This can lead to a brief period in which the pods are running, but network policies that should apply to connections to and from the pods are not enforced.

msrc
3 месяца назад

Network restriction bypass via race condition during namespace termination

CVSS3: 3.1
debian
8 месяцев назад

A security issue was discovered in Kubernetes where a malicious or com ...

CVSS3: 3.1
github
8 месяцев назад

Kubernetes kube-apiserver Vulnerable to Race Condition

EPSS

Процентиль: 10%
0.00048
Низкий

3.1 Low

CVSS3