UBUNTU-CVE-2024-7598

Source
https://ubuntu.com/security/CVE-2024-7598
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-7598.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2024-7598
Related
Published
2025-03-20T17:15:00Z
Modified
2025-03-26T17:03:27Z
Summary
[none]
Details

A security issue was discovered in Kubernetes where a malicious or compromised pod could bypass network restrictions enforced by network policies during namespace deletion. The order in which objects are deleted during namespace termination is not defined, and it is possible for network policies to be deleted before the pods that they protect. This can lead to a brief period in which the pods are running, but network policies that should apply to connections to and from the pods are not enforced.

References

Affected packages

Ubuntu:20.04:LTS / kubernetes

Package

Name
kubernetes
Purl
pkg:deb/ubuntu/kubernetes@1.0?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.0

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:22.04:LTS / kubernetes

Package

Name
kubernetes
Purl
pkg:deb/ubuntu/kubernetes@1.0?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.0

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.10 / kubernetes

Package

Name
kubernetes
Purl
pkg:deb/ubuntu/kubernetes@1.0?arch=source&distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.0

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.04:LTS / kubernetes

Package

Name
kubernetes
Purl
pkg:deb/ubuntu/kubernetes@1.0?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.0

Ecosystem specific

{
    "ubuntu_priority": "medium"
}