Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

x/vulndb: potential Go vuln in github.com/kyverno/kyverno: CVE-2024-48921 #3231

Closed
GoVulnBot opened this issue Oct 29, 2024 · 1 comment
Closed

Comments

@GoVulnBot
Copy link

Advisory CVE-2024-48921 references a vulnerability in the following Go modules:

Module
github.com/kyverno/kyverno

Description:
Kyverno is a policy engine designed for Kubernetes. A kyverno ClusterPolicy, ie. "disallow-privileged-containers," can be overridden by the creation of a PolicyException in a random namespace. By design, PolicyExceptions are consumed from any namespace. Administrators may not recognize that this allows users with privileges to non-kyverno namespaces to create exceptions. This vulnerability is fixed in 1.13.0.

References:

Cross references:

See doc/quickstart.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: github.com/kyverno/kyverno
      vulnerable_at: 1.13.0
summary: CVE-2024-48921 in github.com/kyverno/kyverno
cves:
    - CVE-2024-48921
references:
    - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-48921
    - web: https://github.com/kyverno/kyverno/security/advisories/GHSA-qjvc-p88j-j9rm
source:
    id: CVE-2024-48921
    created: 2024-10-29T16:01:25.082423053Z
review_status: UNREVIEWED

@zpavlinovic
Copy link
Contributor

Duplicate of #3230

@zpavlinovic zpavlinovic marked this as a duplicate of #3230 Oct 30, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants