A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This bug affects Kubelet.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-1914 A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This bug affects Kubelet.
Github GHSA Github GHSA GHSA-xc8m-28vv-4pjc Kubelet vulnerable to bypass of seccomp profile enforcement
Fixes

Solution

To mitigate these vulnerabilities, upgrade Kubelet: https://kubernetes.io/docs/tasks/administer-cluster/cluster-upgrade/ https://kubernetes.io/docs/tasks/administer-cluster/cluster-upgrade/


Workaround

No workaround given by the vendor.

History

Thu, 12 Dec 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: kubernetes

Published:

Updated: 2025-02-13T16:44:13.942Z

Reserved: 2023-04-30T22:44:39.597Z

Link: CVE-2023-2431

cve-icon Vulnrichment

Updated: 2024-08-02T06:19:15.139Z

cve-icon NVD

Status : Modified

Published: 2023-06-16T08:15:08.770

Modified: 2024-12-12T16:15:07.937

Link: CVE-2023-2431

cve-icon Redhat

Severity : Low

Publid Date: 2023-06-16T00:00:00Z

Links: CVE-2023-2431 - Bugzilla

cve-icon OpenCVE Enrichment

No data.