-
Notifications
You must be signed in to change notification settings - Fork 55
Description
A security issue was discovered in Kubernetes where a user may be able to create a container with subpath volume mounts to access files & directories outside of the volume, including on the host filesystem.
This issue has been rated High (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), and assigned CVE-2021-25741.
Affected Components and Configurations
This bug affects kubelet.
Environments where cluster administrators have restricted the ability to create hostPath mounts are the most seriously affected. Exploitation allows hostPath-like access without use of the hostPath feature, thus bypassing the restriction.
In a default Kubernetes environment, exploitation could be used to obscure misuse of already-granted privileges.
Affected Versions
• v1.22.0 - v1.22.1
• v1.21.0 - v1.21.4
• v1.20.0 - v1.20.10
• <= v1.19.14
Fixed Versions
This issue is fixed in the following versions:
• v1.22.2
• v1.21.5
• v1.20.11
• v1.19.15
Mitigation
To mitigate this vulnerability without upgrading kubelet, you can disable the VolumeSubpath feature gate on kubelet and kube-apiserver, and remove any existing Pods making use of the feature.
You can also use admission control to prevent less-trusted users from running containers as root to reduce the impact of successful exploitation.
Detection
If you find evidence that this vulnerability has been exploited, please contact security@kubernetes.io
For additional details, see Kubernetes Issue #104980.
AKS-HCI Information:
Please upgrade to the August AKS-HCI release – it contains the patched kubelet version needed to fix this vulnerability.
<3 AKS-HCI team