logo

CVE-2024-7598 k8s.io/kubernetes/cmd/kube-apiserver

Package

Manager: go
Name: k8s.io/kubernetes/cmd/kube-apiserver
Vulnerable Version: >=1.3.0 <=1.32.3

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 7e-05 pctl0.00386

Details

Kubernetes kube-apiserver Vulnerable to Race Condition A security issue was discovered in Kubernetes where a malicious or compromised pod could bypass network restrictions enforced by network policies during namespace deletion. The order in which objects are deleted during namespace termination is not defined, and it is possible for network policies to be deleted before the pods that they protect. This can lead to a brief period in which the pods are running, but network policies that should apply to connections to and from the pods are not enforced.

Metadata

Created: 2025-03-20T18:30:30Z
Modified: 2025-03-21T17:44:11Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-r56h-j38w-hrqq/GHSA-r56h-j38w-hrqq.json
CWE IDs: ["CWE-362"]
Alternative ID: GHSA-r56h-j38w-hrqq
Finding: F124
Auto approve: 1