|
|
Message-ID: <CAHXwHVwYq+1FruWhMoyG-jY=g8AENSX+Xqh20pkBkeZJZm_wDw@mail.gmail.com>
Date: Thu, 20 Mar 2025 12:38:32 -0400
From: Craig Ingram <cjingram@...gle.com>
To: oss-security@...ts.openwall.com
Subject: [kubernetes] CVE-2024-7598: Network restriction bypass via race
condition during namespace termination
Hello Kubernetes Community,
A security issue was discovered in Kubernetes where a malicious or
compromised pod could bypass network restrictions enforced by network
policies during namespace deletion. The order in which objects are deleted
during namespace termination is not defined, and it is possible for network
policies to be deleted before the pods that they protect. This can lead to
a brief period in which the pods are running, but network policies that
should apply to connections to and from the pods are not enforced.
This issue has been rated Low (3.1)
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
<https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N>,
and assigned CVE-2024-7598.
Am I vulnerable?
All clusters that rely on the NetworkPolicy API may be vulnerable. Run the
following command to see if network policies are in use:
kubectl get networkpolicies.networking.k8s.io --all-namespaces
Affected Versions
-
kube-apiserver >= v1.3
How do I mitigate this vulnerability?
This issue can be mitigated by:
-
Manually deleting pods and workload resources that orchestrate pods
before starting namespace deletion
-
Adding finalizers to network policies to prevent them from being deleted
until the pods that they protect have been deleted first. The following
proof-of-concept controller automates this process:
-
https://github.com/kubernetes-sigs/network-policy-finalizer
Fixed Versions
-
None. A longer term comprehensive fix is proposed in the following KEP:
-
https://github.com/kubernetes/enhancements/pull/5095
Detection
Users of network policies may be able to detect abuse via network logs. The
exact details of this process are environment specific.
If you find evidence that this vulnerability has been exploited, please
contact security@...ernetes.io
Additional Details
See the GitHub issue for more details:
https://github.com/kubernetes/kubernetes/issues/126587
Acknowledgements
This vulnerability was reported by John McGuinness @s1xtw03 and Aaron
Coffey @aaroncoffey.
The issue was coordinated by:
Antonio Ojea @aojea
Tim Hockin @thockin
Dan Winship @danwinship
Shane Utt @shaneutt
David Eads @deads2k
Clayton Colemon @smarterclayton
Mo Khan @enj
Craig Ingram @cji
Thank You,
Craig Ingram on behalf of the Kubernetes Security Response Committee
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.