Accepting request 1255970 from devel:kubic
Monthly Patch Release – March, 2025: Update to version 1.32.3 --- CVE-2025-1767: GitRepo Volume Inadvertent Local Repository Access, bsc#1239643 * TL;DR: Please refer to the github issue for details on detecting and mitigating the CVE, if impacted: https://github.com/kubernetes/kubernetes/issues/130786 OBS-URL: https://build.opensuse.org/request/show/1255970 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/kubernetes1.32?expand=0&rev=4
This commit is contained in:
2
_service
2
_service
@@ -5,7 +5,7 @@
|
||||
<param name="exclude">.git</param>
|
||||
<param name="versionformat">@PARENT_TAG@</param>
|
||||
<param name="versionrewrite-pattern">v(.*)</param>
|
||||
<param name="revision">v1.32.2</param>
|
||||
<param name="revision">v1.32.3</param>
|
||||
<param name="changesgenerate">enable</param>
|
||||
</service>
|
||||
<service name="tar" mode="manual"/>
|
||||
|
@@ -1,4 +1,4 @@
|
||||
<servicedata>
|
||||
<service name="tar_scm">
|
||||
<param name="url">https://github.com/kubernetes/kubernetes.git</param>
|
||||
<param name="changesrevision">67a30c0adcf52bd3f56ff0893ce19966be12991f</param></service></servicedata>
|
||||
<param name="changesrevision">32cc146f75aad04beaaa245a7157eb35063a9f99</param></service></servicedata>
|
@@ -1,3 +0,0 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:0b407935be674ff58ca12dac3d87ac2fcfdee868f5833f2c7f1a6c84928a4e76
|
||||
size 21437716
|
3
kubernetes-1.32.3.tar.xz
Normal file
3
kubernetes-1.32.3.tar.xz
Normal file
@@ -0,0 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:7e8d093040c927d9eb56ea52db78ae9afd99e9edd91b163c29fcfbea58359b8f
|
||||
size 21440476
|
@@ -1,4 +1,4 @@
|
||||
name: kubernetes
|
||||
version: 1.32.2
|
||||
mtime: 1739395186
|
||||
commit: 67a30c0adcf52bd3f56ff0893ce19966be12991f
|
||||
version: 1.32.3
|
||||
mtime: 1741722740
|
||||
commit: 32cc146f75aad04beaaa245a7157eb35063a9f99
|
||||
|
@@ -1,3 +1,63 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Mar 25 12:36:22 UTC 2025 - Priyanka Saggu <priyanka.saggu@suse.com>
|
||||
|
||||
- CVE-2025-1767: GitRepo Volume Inadvertent Local Repository Access, bsc#1239643
|
||||
|
||||
* TL;DR: Please refer to the github issue for details on detecting and mitigating the CVE, if impacted:
|
||||
https://github.com/kubernetes/kubernetes/issues/130786
|
||||
|
||||
****Important note to users and administrators****
|
||||
|
||||
* How do I mitigate this vulnerability?
|
||||
|
||||
To mitigate this vulnerability, you must use an init container to perform git clone operation and then mount the directory into the Pod's container. An example of this approach is provided here: https://gist.github.com/tallclair/849601a16cebeee581ef2be50c351841
|
||||
|
||||
Note: You can also restrict the use of gitRepo volumes in your cluster using policies such as ValidatingAdmissionPolicy or through Restricted pod security standard policy. You can use the following Common Expression Language (CEL) expression as part of a policy to reject use of gitRepo volumes:
|
||||
`has(object.spec.volumes) || !object.spec.volumes.exists(v, has(v.gitRepo))`
|
||||
|
||||
* Detection:
|
||||
|
||||
To detect whether this vulnerability has been exploited, you can use the following command to list all pods that use the in-tree gitRepo volume and clones to a .git subdirectory.
|
||||
|
||||
```
|
||||
kubectl get pods --all-namespaces -o json | jq '.items[] | select(.spec.volumes[].gitRepo.repository | test("^/")) | {name: .metadata.name, namespace: .metadata.namespace, repository: (.spec.volumes[] | select(.gitRepo) | .gitRepo.repository)}'
|
||||
```
|
||||
|
||||
Please plan and consider migrating to Kubernetes v1.33 (~ Release Date: April 23, 2025).
|
||||
Since starting v1.33, the impacted gitRepo volume plugin will be disabled by default.
|
||||
Refer: https://github.com/kubernetes/kubernetes/pull/129923
|
||||
|
||||
No prior Kubernetes versions (v1.29 - v1.32), will receive any backport fixe patches for this CVE, since there isn't a fully non-code-breaking patch available.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Mar 12 05:01:46 UTC 2025 - Priyanka Saggu <priyanka.saggu@suse.com>
|
||||
|
||||
- Update to version 1.32.3:
|
||||
* Add the feature gate `OrderedNamespaceDeletion` for apiserver
|
||||
* conntrack reconciler must check the dst port
|
||||
* fix(pod/util): typos in getting pod validation options
|
||||
* Add ControllerRoles Test
|
||||
* Fix Fixture Data
|
||||
* Add Watch to controller roles
|
||||
* Generate register files for all examples
|
||||
* add simpletype pkg in v1 for register-gen test
|
||||
* Add codegen::register to hack/update-codegen.sh
|
||||
* Add missing imports in register-gen
|
||||
* Revert "Add random interval to nodeStatusReport interval every time after an actual node status change"
|
||||
* Remove the feature-gate check before populating serverRunOptions.Flagz
|
||||
* test: Add emulated-version flag verification in flagz test
|
||||
* fix: flagz endpoint to return parsed flags value
|
||||
* kubeadm: fix panic when no UpgradeConfiguration was found in the config file
|
||||
* proxy: should add PingPeriod for websocket translator
|
||||
* Honor KUBE_HACK_TOOLS_GOTOOLCHAIN
|
||||
* Deflake the PodReplacementPolicyFeatureToggling Job integration test
|
||||
* Limit ResourceQuota LIST requests to times when informer is not synced
|
||||
* kubelet: fix DRA registration test
|
||||
* Fix the flaky Job test: TestSuccessPolicy_ReEnabling
|
||||
* bump netlink
|
||||
* DRA CEL: skip estimating the cost in the scheduler
|
||||
* DRA CEL: add missing size estimator
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Feb 18 09:13:41 UTC 2025 - Priyanka Saggu <priyanka.saggu@suse.com>
|
||||
|
||||
|
@@ -22,7 +22,7 @@
|
||||
%define baseversionminus1 1.31
|
||||
|
||||
Name: kubernetes%{baseversion}
|
||||
Version: 1.32.2
|
||||
Version: 1.32.3
|
||||
Release: 0
|
||||
Summary: Container Scheduling and Management
|
||||
License: Apache-2.0
|
||||
@@ -84,9 +84,12 @@ for management and discovery.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
# packages to build containerized control plane
|
||||
|
||||
%package apiserver
|
||||
Summary: Kubernetes apiserver for container image
|
||||
Group: System/Management
|
||||
|
Reference in New Issue
Block a user