blob: d2997188de7df95109665557c2337ffa349ff642 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
|
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="202405-31">
<title>Kubelet: Privilege Escalation</title>
<synopsis>A vulnerability has been discovered in Kubelet, which can lead to privilege escalation.</synopsis>
<product type="ebuild">kubelet</product>
<announced>2024-05-12</announced>
<revised count="1">2024-05-12</revised>
<bug>918665</bug>
<access>remote</access>
<affected>
<package name="sys-cluster/kubelet" auto="yes" arch="*">
<unaffected range="ge">1.28.5</unaffected>
<vulnerable range="lt">1.28.5</vulnerable>
</package>
</affected>
<background>
<p>Kubelet is a Kubernetes Node Agent.</p>
</background>
<description>
<p>A vulnerability has been discovered in Kubelet. Please review the CVE identifier referenced below for details.</p>
</description>
<impact type="high">
<p>A security issue was discovered in Kubernetes where a user that can create pods and persistent volumes on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they are using an in-tree storage plugin for Windows nodes.</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All Kubelet users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose ">=sys-cluster/kubelet-1.28.5"
</code>
</resolution>
<references>
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5528">CVE-2023-5528</uri>
</references>
<metadata tag="requester" timestamp="2024-05-12T05:13:03.608382Z">graaff</metadata>
<metadata tag="submitter" timestamp="2024-05-12T05:13:03.612681Z">graaff</metadata>
</glsa>
|