In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade k8s.io/kubernetes/pkg/controller/namespace/deletion
to version 1.33.0-alpha.3 or higher.
Affected versions of this package are vulnerable to Race Condition during the namespace deletion process in deleteAllContent()
in namespaced_resources_deleter.go
. An attacker can bypass network restrictions because network policies are deleted before the pods they are meant to protect.
All clusters using the Kubernetes NetworkPolicy API may be vulnerable.
This vulnerability can be avoided by manually deleting resources before triggering namespaced resource deletion or by implementing a finalizer policy to enforce safe ordered deletion behavior (see https://github.com/kubernetes-sigs/network-policy-finalizer).