We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
In GitHub Security Advisory GHSA-pxhw-596r-rwq5, there is a vulnerability in the following Go packages or modules:
Cross references:
See doc/triage.md for instructions on how to triage this report.
modules: - module: k8s.io/kubernetes versions: - introduced: TODO (earliest fixed "1.28.9", vuln range ">= 1.28.0, <= 1.28.8") packages: - package: k8s.io/kubernetes - module: k8s.io/kubernetes versions: - introduced: TODO (earliest fixed "1.29.4", vuln range ">= 1.29.0, <= 1.29.3") packages: - package: k8s.io/kubernetes - module: k8s.io/kubernetes versions: - fixed: 1.27.13 vulnerable_at: 1.27.12 packages: - package: k8s.io/kubernetes summary: |- Kubernetes allows bypassing mountable secrets policy imposed by the ServiceAccount admission plugin in k8s.io/kubernetes cves: - CVE-2024-3177 ghsas: - GHSA-pxhw-596r-rwq5 references: - web: https://nvd.nist.gov/vuln/detail/CVE-2024-3177 - report: https://github.com/kubernetes/kubernetes/issues/124336 - web: https://groups.google.com/g/kubernetes-security-announce/c/JxjHf7fkVd8/m/oVCzypyOAQAJ - fix: https://github.com/kubernetes/kubernetes/commit/7c861b1ecad97e1ab9332c970c9294a72065111a - fix: https://github.com/kubernetes/kubernetes/commit/a619ca3fd3ee3c222d9df784622020de398076d2 - fix: https://github.com/kubernetes/kubernetes/commit/f9fb6cf52a769a599a45e700375115c2ecc86e9b - advisory: https://github.com/advisories/GHSA-pxhw-596r-rwq5 source: id: GHSA-pxhw-596r-rwq5
The text was updated successfully, but these errors were encountered:
Change https://go.dev/cl/586484 mentions this issue: data/reports: add 73 unreviewed reports
data/reports: add 73 unreviewed reports
Sorry, something went wrong.
Change https://go.dev/cl/590039 mentions this issue: data/reports: add 51 reports
data/reports: add 51 reports
96f0f48
Change https://go.dev/cl/595975 mentions this issue: data/reports: update GO-2024-2746
data/reports: update GO-2024-2746
9373b6c
- data/reports/GO-2024-2746.yaml Updates #2746 Change-Id: Ib156e8b36cf9c768a58ead781bdabccfc4c0b2fb Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/595975 Reviewed-by: Tatiana Bradley <tatianabradley@google.com> LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com> Auto-Submit: Zvonimir Pavlinovic <zpavlinovic@google.com>
maceonthompson
No branches or pull requests
In GitHub Security Advisory GHSA-pxhw-596r-rwq5, there is a vulnerability in the following Go packages or modules:
Cross references:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: