A privilege escalation flaw was found in the node restriction admission plugin of the kubernetes api server of OpenShift. A remote attacker who modifies the node role label could steer workloads from the control plane and etcd nodes onto different worker nodes and gain broader access to the cluster.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2023:5006 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2023:6130 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2023:6842 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2023:7479 | Vendor Advisory |
https://access.redhat.com/security/cve/CVE-2023-5408 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2242173 | Issue Tracking Vendor Advisory |
https://github.com/openshift/kubernetes/pull/1736 | Issue Tracking |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2023-11-02T02:55:58.195Z
Updated: 2024-05-01T20:21:25.654Z
Reserved: 2023-10-04T17:58:23.775Z
Link: CVE-2023-5408
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-11-02T03:15:10.230
Modified: 2024-01-21T01:48:09.767
Link: CVE-2023-5408
JSON object: View
Redhat Information
No data.