A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using containers, init containers, and ephemeral containers with the envFrom field populated. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the kubernetes.io/enforce-mountable-secrets annotation are used together with containers, init containers, and ephemeral containers with the envFrom field populated.
History

Tue, 10 Sep 2024 21:00:00 +0000

Type Values Removed Values Added
Description A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using containers, init containers, and ephemeral containers with the envFrom field populated. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the kubernetes.io/enforce-mountable-secrets annotation are used together with containers, init containers, and ephemeral containers with the envFrom field populated. A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using containers, init containers, and ephemeral containers with the envFrom field populated. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the kubernetes.io/enforce-mountable-secrets annotation are used together with containers, init containers, and ephemeral containers with the envFrom field populated.

cve-icon MITRE

Status: PUBLISHED

Assigner: kubernetes

Published: 2024-04-22T23:00:39.702Z

Updated: 2024-09-10T20:48:09.780Z

Reserved: 2024-04-01T23:49:13.716Z

Link: CVE-2024-3177

cve-icon Vulnrichment

Updated: 2024-08-01T20:05:07.568Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-22T23:15:51.180

Modified: 2024-09-10T21:15:13.087

Link: CVE-2024-3177

cve-icon Redhat

Severity : Low

Publid Date: 2024-04-16T16:00:00Z

Links: CVE-2024-3177 - Bugzilla