CVE-2023-2431

Source
https://cve.org/CVERecord?id=CVE-2023-2431
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-2431.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-2431
Aliases
Downstream
Related
Published
2023-06-16T07:08:33.476Z
Modified
2026-05-13T04:44:15.220364314Z
Severity
  • 3.4 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N CVSS Calculator
Summary
Bypass of seccomp profile enforcement
Details

A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This bug affects Kubelet.

Database specific
{
    "cna_assigner": "kubernetes",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/2xxx/CVE-2023-2431.json",
    "cwe_ids": [
        "CWE-1287"
    ]
}
References

Affected packages

Git / github.com/kubernetes/kubernetes

Affected ranges

Type
GIT
Repo
https://github.com/kubernetes/kubernetes
Events

Affected versions

v1.*
v1.27.0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-2431.json"