In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade Debian:13
kubernetes
to version 1.20.5+really1.20.2-1 or higher.
Note: Versions mentioned in the description apply only to the upstream kubernetes
package and not the kubernetes
package as distributed by Debian
.
See How to fix?
for Debian:13
relevant fixed versions and status.
A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation.