MGASA-2024-0389

Source
https://advisories.mageia.org/MGASA-2024-0389.html
Import Source
https://advisories.mageia.org/MGASA-2024-0389.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2024-0389
Related
Published
2024-12-06T17:09:22Z
Modified
2024-12-06T16:46:04Z
Summary
Updated kubernetes kubernetes packages fix security vulnerabilities
Details

A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using containers, init containers, and ephemeral containers with the envFrom field populated. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the kubernetes.io/enforce-mountable-secrets annotation are used together with containers, init containers, and ephemeral containers with the envFrom field populated. CVE-2024-3177 The Kubernetes kubelet component allows arbitrary command execution via specially crafted gitRepo volumes. CVE-2024-10220

References
Credits

Affected packages

Mageia:9 / kubernetes

Package

Name
kubernetes
Purl
pkg:rpm/mageia/kubernetes?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.27.16-2.mga9

Ecosystem specific

{
    "section": "core"
}