Lucene search

K
gentooGentoo FoundationGLSA-202405-31
HistoryMay 12, 2024 - 12:00 a.m.

Kubelet: Privilege Escalation

2024-05-1200:00:00
Gentoo Foundation
security.gentoo.org
7
kubelet
kubernetes
privilege escalation
cve
windows nodes
admin privilege

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

35.5%

Background

Kubelet is a Kubernetes Node Agent.

Description

A vulnerability has been discovered in Kubelet. Please review the CVE identifier referenced below for details.

Impact

A security issue was discovered in Kubernetes where a user that can create pods and persistent volumes on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they are using an in-tree storage plugin for Windows nodes.

Workaround

There is no known workaround at this time.

Resolution

All Kubelet users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=sys-cluster/kubelet-1.28.5"
OSVersionArchitecturePackageVersionFilename
Gentooanyallsys-cluster/kubelet< 1.28.5UNKNOWN

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

35.5%