From a1c03996e73527ab24e4930a665991a173efdf7f Mon Sep 17 00:00:00 2001 From: GLSAMaker Date: Sun, 12 May 2024 05:13:03 +0000 Subject: [ GLSA 202405-31 ] Kubelet: Privilege Escalation Bug: https://bugs.gentoo.org/918665 Signed-off-by: GLSAMaker Signed-off-by: Hans de Graaff --- glsa-202405-31.xml | 42 ++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 42 insertions(+) create mode 100644 glsa-202405-31.xml diff --git a/glsa-202405-31.xml b/glsa-202405-31.xml new file mode 100644 index 00000000..d2997188 --- /dev/null +++ b/glsa-202405-31.xml @@ -0,0 +1,42 @@ + + + + Kubelet: Privilege Escalation + A vulnerability has been discovered in Kubelet, which can lead to privilege escalation. + kubelet + 2024-05-12 + 2024-05-12 + 918665 + remote + + + 1.28.5 + 1.28.5 + + + +

Kubelet is a Kubernetes Node Agent.

+
+ +

A vulnerability has been discovered in Kubelet. Please review the CVE identifier referenced below for details.

+
+ +

A security issue was discovered in Kubernetes where a user that can create pods and persistent volumes on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they are using an in-tree storage plugin for Windows nodes.

+
+ +

There is no known workaround at this time.

+
+ +

All Kubelet users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-cluster/kubelet-1.28.5" + +
+ + CVE-2023-5528 + + graaff + graaff +
\ No newline at end of file -- cgit v1.2.3-65-gdbad