First published: Fri Jun 16 2023(Updated: )
A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This bug affects Kubelet.
Credit: jordan@liggitt.net jordan@liggitt.net
Affected Software | Affected Version | How to fix |
---|---|---|
Kubernetes Kubernetes | <1.24.14 | |
Kubernetes Kubernetes | >=1.25.0<1.25.10 | |
Kubernetes Kubernetes | >=1.26.0<1.26.5 | |
Kubernetes Kubernetes | >=1.27.0<1.27.2 | |
Fedoraproject Fedora | =38 | |
go/k8s.io/kubernetes | >=1.27.0<1.27.2 | 1.27.2 |
go/k8s.io/kubernetes | >=1.26.0<1.26.5 | 1.26.5 |
go/k8s.io/kubernetes | >=1.25.0<1.25.10 | 1.25.10 |
go/k8s.io/kubernetes | <1.24.14 | 1.24.14 |
To mitigate these vulnerabilities, upgrade Kubelet: https://kubernetes.io/docs/tasks/administer-cluster/cluster-upgrade/ https://kubernetes.io/docs/tasks/administer-cluster/cluster-upgrade/
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2431 is a security issue in Kubelet that allows pods to bypass the seccomp profile enforcement.
Pods that use the localhost type for seccomp profile but specify an empty profile field are affected by this vulnerability.
CVE-2023-2431 has a severity score of 5.5, which is considered medium.
To fix CVE-2023-2431, update Kubernetes to version 1.24.15, 1.25.11, 1.26.6, 1.27.3, or later.
You can find more information about CVE-2023-2431 in the following references: [GitHub Issue](https://github.com/kubernetes/kubernetes/issues/118690), [Google Group](https://groups.google.com/g/kubernetes-security-announce/c/QHmx0HOQa10), [Fedora Mailing List](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/43HDSKBKPSW53OW647B5ETHRWFFNHSRQ/).