Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-40016.json
JSON Data
https://api.test.osv.dev/v1/vulns/AZL-40016
Upstream
Published
2024-04-22T23:15:51Z
Modified
2026-04-01T05:13:56.162212Z
Summary
CVE-2024-3177 affecting package kubernetes for versions less than 1.30.1-1
Details

A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using containers, init containers, and ephemeral containers with the envFrom field populated. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the kubernetes.io/enforce-mountable-secrets annotation are used together with containers, init containers, and ephemeral containers with the envFrom field populated.

References

Affected packages

Azure Linux:3 / kubernetes

Package

Name
kubernetes
Purl
pkg:rpm/azure-linux/kubernetes

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.30.1-1

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-40016.json"