GHSA-r56h-j38w-hrqq

Suggest an improvement
Source
https://github.com/advisories/GHSA-r56h-j38w-hrqq
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-r56h-j38w-hrqq/GHSA-r56h-j38w-hrqq.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-r56h-j38w-hrqq
Aliases
Published
2025-03-20T18:30:30Z
Modified
2025-03-25T20:22:18.915843Z
Severity
  • 3.1 (Low) CVSS_V3 - CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
Kubernetes kube-apiserver Vulnerable to Race Condition
Details

A security issue was discovered in Kubernetes where a malicious or compromised pod could bypass network restrictions enforced by network policies during namespace deletion. The order in which objects are deleted during namespace termination is not defined, and it is possible for network policies to be deleted before the pods that they protect. This can lead to a brief period in which the pods are running, but network policies that should apply to connections to and from the pods are not enforced.

Database specific
{
    "nvd_published_at": "2025-03-20T17:15:37Z",
    "cwe_ids": [
        "CWE-362"
    ],
    "severity": "LOW",
    "github_reviewed": true,
    "github_reviewed_at": "2025-03-21T17:44:11Z"
}
References

Affected packages

Go / k8s.io/kubernetes/cmd/kube-apiserver

Package

Name
k8s.io/kubernetes/cmd/kube-apiserver
View open source insights on deps.dev
Purl
pkg:golang/k8s.io/kubernetes/cmd/kube-apiserver

Affected ranges

Type
SEMVER
Events
Introduced
1.3.0
Last affected
1.32.3