109 results (0.003 seconds)

CVSS: 7.5EPSS: 30%CPEs: 1EXPL: 0

30 Jun 2025 — Kubernetes releases compiled with vulnerable Go versions (prior to Go 1.21.11 / 1.22.4) are affected by a race condition in the os.RemoveAll function used during volume cleanup. A malicious container can exploit this by timing a symbolic link replacement to redirect the deletion operation outside the intended volume path. This can result in deletion of arbitrary files or directories on the host system, including data from other pods or host volumes, leading to data loss and potential privilege escalation. ... • https://github.com/kubernetes/kubernetes/issues/132267 • CWE-363: Race Condition Enabling Link Following •

CVSS: 3.3EPSS: 0%CPEs: 2EXPL: 0

23 Jun 2025 — A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation. • https://github.com/kubernetes/kubernetes/issues/132151 • CWE-20: Improper Input Validation •

CVSS: 9.0EPSS: 30%CPEs: 2EXPL: 2

28 Feb 2025 — A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `auth-url` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.) These are all security issues fixed in the govulncheck-vulndb-0.0.20250327T184518-1.1 packag... • https://packetstorm.news/files/id/190070 • CWE-20: Improper Input Validation •

CVSS: 3.1EPSS: 0%CPEs: 1EXPL: 0

28 Feb 2025 — A security issue was discovered in Kubernetes where a malicious or compromised pod could bypass network restrictions enforced by network policies during namespace deletion. The order in which objects are deleted during namespace termination is not defined, and it is possible for network policies to be deleted before the pods that they protect. This can lead to a brief period in which the pods are running, but network policies that should apply to connections to and from the pods are not enforced. These are ... • https://github.com/kubernetes/kubernetes/issues/126587 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 4.8EPSS: 0%CPEs: 2EXPL: 1

28 Feb 2025 — A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where attacker-provided data are included in a filename by the ingress-nginx Admission Controller feature, resulting in directory traversal within the container. This could result in denial of service, or when combined with other vulnerabilities, limited disclosure of Secret objects from the cluster. These are all security issues fixed in the govulncheck-vulndb-0.0.20250327T184518-1.1 package on the GA media of open... • https://packetstorm.news/files/id/190070 • CWE-20: Improper Input Validation •

CVSS: 9.0EPSS: 7%CPEs: 2EXPL: 3

28 Feb 2025 — A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `auth-tls-match-cn` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.) These are all security issues fixed in the govulncheck-vulndb-0.0.20250327T184518-1... • https://packetstorm.news/files/id/190070 • CWE-20: Improper Input Validation •

CVSS: 6.6EPSS: 0%CPEs: 4EXPL: 0

28 Feb 2025 — This CVE affects only Windows worker nodes. Your worker node is vulnerable to this issue if it is running one of the affected versions listed below. A flaw was found in Kubernetes Windows nodes. This vulnerability allows a user with the ability to query a node's '/logs' endpoint to execute arbitrary commands on the host. These are all security issues fixed in the govulncheck-vulndb-0.0.20250327T184518-1.1 package on the GA media of openSUSE Tumbleweed. • https://github.com/kubernetes/kubernetes/issues/129654 • CWE-20: Improper Input Validation CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 10.0EPSS: 87%CPEs: 2EXPL: 23

28 Feb 2025 — A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller. This can lead to disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.) These are all security issues fixed in the govulncheck-vulndb-0.0.20250327T184518-1.1 package on the GA media of openSUSE Tumble... • https://packetstorm.news/files/id/190070 • CWE-653: Improper Isolation or Compartmentalization •

CVSS: 7.7EPSS: 0%CPEs: 1EXPL: 0

28 Feb 2025 — This CVE only affects Kubernetes clusters that utilize the in-tree gitRepo volume to clone git repositories from other pods within the same node. Since the in-tree gitRepo volume feature has been deprecated and will not receive security updates upstream, any cluster still using this feature remains vulnerable. These are all security issues fixed in the govulncheck-vulndb-0.0.20250327T184518-1.1 package on the GA media of openSUSE Tumbleweed. • https://github.com/kubernetes/kubernetes/pull/130786 • CWE-20: Improper Input Validation •

CVSS: 9.0EPSS: 40%CPEs: 2EXPL: 1

28 Feb 2025 — A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `mirror-target` and `mirror-host` Ingress annotations can be used to inject arbitrary configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.) These are all security issues fixed in the govulncheck-vul... • https://packetstorm.news/files/id/190070 • CWE-20: Improper Input Validation •