New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2021-25735: Validating Admission Webhook does not observe some previous fields #100096
Comments
@cjcullen: This issue is currently awaiting triage. If a SIG or subproject determines this is a relevant issue, they will accept it by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Hi, do you know if this vulnerability can be exploited remotely? |
@da-edra Anyone authorized to |
@tallclair thanks. :) |
@tallclair Found this: https://sysdig.com/blog/cve-2021-25735-kubernetes-admission-bypass/ |
/label official-cve-feed (Related to kubernetes/sig-security#1) |
A security issue was discovered in kube-apiserver that could allow node updates to bypass a Validating Admission Webhook. You are only affected by this vulnerability if you run a Validating Admission Webhook for Nodes that denies admission based at least partially on the old state of the Node object.
This issue has been rated Medium (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H), and assigned CVE-2021-25735.
Note: This only impacts validating admission plugins that rely on old values in certain fields, and does not impact calls from kubelets that go through the built-in NodeRestriction admission plugin.
Affected Versions
Fixed Versions
This issue is fixed in the following versions:
Detection
If you find evidence that this vulnerability has been exploited, please contact security@kubernetes.io
Acknowledgements
This vulnerability was reported by Rogerio Bastos & Ari Lima from RedHat
The text was updated successfully, but these errors were encountered: