Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

x/vulndb: potential Go vuln in github.com/openshift/kubernetes: CVE-2023-5408 #2171

Closed
GoVulnBot opened this issue Nov 2, 2023 · 2 comments
Assignees
Labels
excluded: EFFECTIVELY_PRIVATE This vulnerability exists in a package can be imported, but isn't meant to be outside that module.

Comments

@GoVulnBot
Copy link

CVE-2023-5408 references github.com/openshift/kubernetes, which may be a Go module.

Description:
A privilege escalation flaw was found in the node restriction admission plugin of the kubernetes api server of OpenShift. A remote attacker who modifies the node role label could steer workloads from the control plane and etcd nodes onto different worker nodes and gain broader access to the cluster.

References:

Cross references:
No existing reports found with this module or alias.

See doc/triage.md for instructions on how to triage this report.

modules:
    - module: github.com/openshift/kubernetes
      vulnerable_at: 1.28.2
      packages:
        - package: kubernetes
cves:
    - CVE-2023-5408
references:
    - web: https://access.redhat.com/errata/RHSA-2023:6130
    - web: https://access.redhat.com/security/cve/CVE-2023-5408
    - web: https://bugzilla.redhat.com/show_bug.cgi?id=2242173
    - fix: https://github.com/openshift/kubernetes/pull/1736

@neild neild self-assigned this Nov 2, 2023
@neild neild added the excluded: EFFECTIVELY_PRIVATE This vulnerability exists in a package can be imported, but isn't meant to be outside that module. label Nov 2, 2023
@gopherbot
Copy link
Contributor

Change https://go.dev/cl/539339 mentions this issue: data/excluded: batch add 7 excluded reports

@gopherbot
Copy link
Contributor

Change https://go.dev/cl/592763 mentions this issue: data/reports: unexclude 75 reports

# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
excluded: EFFECTIVELY_PRIVATE This vulnerability exists in a package can be imported, but isn't meant to be outside that module.
Projects
None yet
Development

No branches or pull requests

3 participants