Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update module github.com/kyverno/kyverno to v1.13.0 [SECURITY] #53

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Oct 29, 2024

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
github.com/kyverno/kyverno v1.12.6 -> v1.13.0 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2024-48921

Summary

A kyverno ClusterPolicy, ie. "disallow-privileged-containers," can be overridden by the creation of a PolicyException in a random namespace.

Details

By design, PolicyExceptions are consumed from any namespace. Administrators may not recognize that this allows users with privileges to non-kyverno namespaces to create exceptions.

PoC

  1. Administrator creates "disallow-privileged-containers" ClusterPolicy that applies to resources in the namespace "ubuntu-restricted"
  2. Cluster user creates a PolicyException object for "disallow-privileged-containers" in namespace "ubuntu-restricted"
  3. Cluster user creates a pod with a privileged container in "ubuntu-restricted"
  4. Cluster user escalates to root on the node from the privileged container

Impact

Administrators attempting to enforce cluster security through kyverno policies, but that allow less privileged users to create resources


Release Notes

kyverno/kyverno (github.com/kyverno/kyverno)

v1.13.0

Compare Source

Note
  • Removed deprecated flag reportsChunkSize.
  • Added --tufRootRaw flag to pass tuf root for custom sigstore deployments.

Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot requested a review from a team as a code owner October 29, 2024 17:34
@renovate renovate bot added dependencies renovate This is an automated PR by RenovateBot labels Oct 29, 2024
@renovate renovate bot force-pushed the renovate/go-github.com-kyverno-kyverno-vulnerability branch 2 times, most recently from c954af7 to af594e7 Compare December 9, 2024 15:05
@renovate renovate bot force-pushed the renovate/go-github.com-kyverno-kyverno-vulnerability branch from af594e7 to e8bde42 Compare December 24, 2024 13:53
@renovate renovate bot force-pushed the renovate/go-github.com-kyverno-kyverno-vulnerability branch from e8bde42 to dd17a3f Compare December 30, 2024 22:17
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies renovate This is an automated PR by RenovateBot
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants