Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. k8s.io/kubernetes/cmd/kube-apiserver
  4. ›
  5. CVE-2024-7598

CVE-2024-7598: Kubernetes kube-apiserver Vulnerable to Race Condition

March 20, 2025 (updated March 21, 2025)

A security issue was discovered in Kubernetes where a malicious or compromised pod could bypass network restrictions enforced by network policies during namespace deletion. The order in which objects are deleted during namespace termination is not defined, and it is possible for network policies to be deleted before the pods that they protect. This can lead to a brief period in which the pods are running, but network policies that should apply to connections to and from the pods are not enforced.

References

  • github.com/advisories/GHSA-r56h-j38w-hrqq
  • github.com/kubernetes/kubernetes
  • github.com/kubernetes/kubernetes/issues/126587
  • groups.google.com/g/kubernetes-security-announce/c/67D7UFqiPRc
  • nvd.nist.gov/vuln/detail/CVE-2024-7598

Code Behaviors & Features

Detect and mitigate CVE-2024-7598 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 1.3.0 up to 1.32.3

Solution

Unfortunately, there is no solution available yet.

Impact 3.1 LOW

CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Source file

go/k8s.io/kubernetes/cmd/kube-apiserver/CVE-2024-7598.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 00:14:44 +0000.