CVE-2024-7598 – k8s.io/kubernetes/cmd/kube-apiserver
Package
Manager: go
Name: k8s.io/kubernetes/cmd/kube-apiserver
Vulnerable Version: >=1.3.0 <=1.32.3
Severity
Level: Low
CVSS v3.1: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 7e-05 pctl0.00386
Details
Kubernetes kube-apiserver Vulnerable to Race Condition A security issue was discovered in Kubernetes where a malicious or compromised pod could bypass network restrictions enforced by network policies during namespace deletion. The order in which objects are deleted during namespace termination is not defined, and it is possible for network policies to be deleted before the pods that they protect. This can lead to a brief period in which the pods are running, but network policies that should apply to connections to and from the pods are not enforced.
Metadata
Created: 2025-03-20T18:30:30Z
Modified: 2025-03-21T17:44:11Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-r56h-j38w-hrqq/GHSA-r56h-j38w-hrqq.json
CWE IDs: ["CWE-362"]
Alternative ID: GHSA-r56h-j38w-hrqq
Finding: F124
Auto approve: 1