mirror of
git://git.yoctoproject.org/meta-virtualization.git
synced 2026-01-27 10:41:26 +01:00
kubernetes: Fix CVE-2024-3177
Upstream-commit: 34546f4725
Reference: https://github.com/kubernetes/kubernetes/issues/124336
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
This commit is contained in:
parent
17ac21e7d7
commit
f92518e205
237
recipes-containers/kubernetes/kubernetes/CVE-2024-3177.patch
Normal file
237
recipes-containers/kubernetes/kubernetes/CVE-2024-3177.patch
Normal file
|
|
@ -0,0 +1,237 @@
|
|||
From 34546f4725df0d5493b4e18e3229d3ed201fe260 Mon Sep 17 00:00:00 2001
|
||||
From: Rita Zhang <rita.z.zhang@gmail.com>
|
||||
Date: Mon, 25 Mar 2024 10:33:41 -0700
|
||||
Subject: [PATCH] Add envFrom to serviceaccount admission plugin
|
||||
|
||||
Signed-off-by: Rita Zhang <rita.z.zhang@gmail.com>
|
||||
|
||||
Upstream-Status: Backport [https://github.com/kubernetes/kubernetes/commit/34546f4725df0d5493b4e18e3229d3ed201fe260]
|
||||
CVE: CVE-2024-3177
|
||||
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
|
||||
---
|
||||
.../pkg/admission/serviceaccount/admission.go | 21 +++
|
||||
.../serviceaccount/admission_test.go | 122 ++++++++++++++++--
|
||||
2 files changed, 132 insertions(+), 11 deletions(-)
|
||||
|
||||
diff --git a/plugin/pkg/admission/serviceaccount/admission.go b/plugin/pkg/admission/serviceaccount/admission.go
|
||||
index c844a051c24b3..3f4338128e53c 100644
|
||||
--- a/plugin/pkg/admission/serviceaccount/admission.go
|
||||
+++ b/plugin/pkg/admission/serviceaccount/admission.go
|
||||
@@ -337,6 +337,13 @@ func (s *Plugin) limitSecretReferences(serviceAccount *corev1.ServiceAccount, po
|
||||
}
|
||||
}
|
||||
}
|
||||
+ for _, envFrom := range container.EnvFrom {
|
||||
+ if envFrom.SecretRef != nil {
|
||||
+ if !mountableSecrets.Has(envFrom.SecretRef.Name) {
|
||||
+ return fmt.Errorf("init container %s with envFrom referencing secret.secretName=\"%s\" is not allowed because service account %s does not reference that secret", container.Name, envFrom.SecretRef.Name, serviceAccount.Name)
|
||||
+ }
|
||||
+ }
|
||||
+ }
|
||||
}
|
||||
|
||||
for _, container := range pod.Spec.Containers {
|
||||
@@ -347,6 +354,13 @@ func (s *Plugin) limitSecretReferences(serviceAccount *corev1.ServiceAccount, po
|
||||
}
|
||||
}
|
||||
}
|
||||
+ for _, envFrom := range container.EnvFrom {
|
||||
+ if envFrom.SecretRef != nil {
|
||||
+ if !mountableSecrets.Has(envFrom.SecretRef.Name) {
|
||||
+ return fmt.Errorf("container %s with envFrom referencing secret.secretName=\"%s\" is not allowed because service account %s does not reference that secret", container.Name, envFrom.SecretRef.Name, serviceAccount.Name)
|
||||
+ }
|
||||
+ }
|
||||
+ }
|
||||
}
|
||||
|
||||
// limit pull secret references as well
|
||||
@@ -388,6 +402,13 @@ func (s *Plugin) limitEphemeralContainerSecretReferences(pod *api.Pod, a admissi
|
||||
}
|
||||
}
|
||||
}
|
||||
+ for _, envFrom := range container.EnvFrom {
|
||||
+ if envFrom.SecretRef != nil {
|
||||
+ if !mountableSecrets.Has(envFrom.SecretRef.Name) {
|
||||
+ return fmt.Errorf("ephemeral container %s with envFrom referencing secret.secretName=\"%s\" is not allowed because service account %s does not reference that secret", container.Name, envFrom.SecretRef.Name, serviceAccount.Name)
|
||||
+ }
|
||||
+ }
|
||||
+ }
|
||||
}
|
||||
return nil
|
||||
}
|
||||
diff --git a/plugin/pkg/admission/serviceaccount/admission_test.go b/plugin/pkg/admission/serviceaccount/admission_test.go
|
||||
index b5155f5cd33e6..01b08da455f47 100644
|
||||
--- a/plugin/pkg/admission/serviceaccount/admission_test.go
|
||||
+++ b/plugin/pkg/admission/serviceaccount/admission_test.go
|
||||
@@ -520,6 +520,25 @@ func TestAllowsReferencedSecret(t *testing.T) {
|
||||
t.Errorf("Unexpected error: %v", err)
|
||||
}
|
||||
|
||||
+ pod2 = &api.Pod{
|
||||
+ Spec: api.PodSpec{
|
||||
+ Containers: []api.Container{
|
||||
+ {
|
||||
+ Name: "container-1",
|
||||
+ EnvFrom: []api.EnvFromSource{
|
||||
+ {
|
||||
+ SecretRef: &api.SecretEnvSource{
|
||||
+ LocalObjectReference: api.LocalObjectReference{
|
||||
+ Name: "foo"}}}},
|
||||
+ },
|
||||
+ },
|
||||
+ },
|
||||
+ }
|
||||
+ attrs = admission.NewAttributesRecord(pod2, nil, api.Kind("Pod").WithVersion("version"), ns, "myname", api.Resource("pods").WithVersion("version"), "", admission.Create, &metav1.CreateOptions{}, false, nil)
|
||||
+ if err := admissiontesting.WithReinvocationTesting(t, admit).Admit(context.TODO(), attrs, nil); err != nil {
|
||||
+ t.Errorf("Unexpected error: %v", err)
|
||||
+ }
|
||||
+
|
||||
pod2 = &api.Pod{
|
||||
Spec: api.PodSpec{
|
||||
InitContainers: []api.Container{
|
||||
@@ -544,6 +563,25 @@ func TestAllowsReferencedSecret(t *testing.T) {
|
||||
t.Errorf("Unexpected error: %v", err)
|
||||
}
|
||||
|
||||
+ pod2 = &api.Pod{
|
||||
+ Spec: api.PodSpec{
|
||||
+ InitContainers: []api.Container{
|
||||
+ {
|
||||
+ Name: "container-1",
|
||||
+ EnvFrom: []api.EnvFromSource{
|
||||
+ {
|
||||
+ SecretRef: &api.SecretEnvSource{
|
||||
+ LocalObjectReference: api.LocalObjectReference{
|
||||
+ Name: "foo"}}}},
|
||||
+ },
|
||||
+ },
|
||||
+ },
|
||||
+ }
|
||||
+ attrs = admission.NewAttributesRecord(pod2, nil, api.Kind("Pod").WithVersion("version"), ns, "myname", api.Resource("pods").WithVersion("version"), "", admission.Create, &metav1.CreateOptions{}, false, nil)
|
||||
+ if err := admissiontesting.WithReinvocationTesting(t, admit).Admit(context.TODO(), attrs, nil); err != nil {
|
||||
+ t.Errorf("Unexpected error: %v", err)
|
||||
+ }
|
||||
+
|
||||
pod2 = &api.Pod{
|
||||
Spec: api.PodSpec{
|
||||
ServiceAccountName: DefaultServiceAccountName,
|
||||
@@ -571,6 +609,28 @@ func TestAllowsReferencedSecret(t *testing.T) {
|
||||
if err := admit.Validate(context.TODO(), attrs, nil); err != nil {
|
||||
t.Errorf("Unexpected error: %v", err)
|
||||
}
|
||||
+
|
||||
+ pod2 = &api.Pod{
|
||||
+ Spec: api.PodSpec{
|
||||
+ ServiceAccountName: DefaultServiceAccountName,
|
||||
+ EphemeralContainers: []api.EphemeralContainer{
|
||||
+ {
|
||||
+ EphemeralContainerCommon: api.EphemeralContainerCommon{
|
||||
+ Name: "container-2",
|
||||
+ EnvFrom: []api.EnvFromSource{{
|
||||
+ SecretRef: &api.SecretEnvSource{
|
||||
+ LocalObjectReference: api.LocalObjectReference{
|
||||
+ Name: "foo"}}}},
|
||||
+ },
|
||||
+ },
|
||||
+ },
|
||||
+ },
|
||||
+ }
|
||||
+ // validate enforces restrictions on secret mounts when operation==update and subresource==ephemeralcontainers"
|
||||
+ attrs = admission.NewAttributesRecord(pod2, nil, api.Kind("Pod").WithVersion("version"), ns, "myname", api.Resource("pods").WithVersion("version"), "ephemeralcontainers", admission.Update, &metav1.UpdateOptions{}, false, nil)
|
||||
+ if err := admit.Validate(context.TODO(), attrs, nil); err != nil {
|
||||
+ t.Errorf("Unexpected error: %v", err)
|
||||
+ }
|
||||
}
|
||||
|
||||
func TestRejectsUnreferencedSecretVolumes(t *testing.T) {
|
||||
@@ -627,25 +687,20 @@ func TestRejectsUnreferencedSecretVolumes(t *testing.T) {
|
||||
|
||||
pod2 = &api.Pod{
|
||||
Spec: api.PodSpec{
|
||||
- InitContainers: []api.Container{
|
||||
+ Containers: []api.Container{
|
||||
{
|
||||
Name: "container-1",
|
||||
- Env: []api.EnvVar{
|
||||
+ EnvFrom: []api.EnvFromSource{
|
||||
{
|
||||
- Name: "env-1",
|
||||
- ValueFrom: &api.EnvVarSource{
|
||||
- SecretKeyRef: &api.SecretKeySelector{
|
||||
- LocalObjectReference: api.LocalObjectReference{Name: "foo"},
|
||||
- },
|
||||
- },
|
||||
- },
|
||||
- },
|
||||
+ SecretRef: &api.SecretEnvSource{
|
||||
+ LocalObjectReference: api.LocalObjectReference{
|
||||
+ Name: "foo"}}}},
|
||||
},
|
||||
},
|
||||
},
|
||||
}
|
||||
attrs = admission.NewAttributesRecord(pod2, nil, api.Kind("Pod").WithVersion("version"), ns, "myname", api.Resource("pods").WithVersion("version"), "", admission.Create, &metav1.CreateOptions{}, false, nil)
|
||||
- if err := admissiontesting.WithReinvocationTesting(t, admit).Admit(context.TODO(), attrs, nil); err == nil || !strings.Contains(err.Error(), "with envVar") {
|
||||
+ if err := admissiontesting.WithReinvocationTesting(t, admit).Admit(context.TODO(), attrs, nil); err == nil || !strings.Contains(err.Error(), "with envFrom") {
|
||||
t.Errorf("Unexpected error: %v", err)
|
||||
}
|
||||
|
||||
@@ -678,6 +733,30 @@ func TestRejectsUnreferencedSecretVolumes(t *testing.T) {
|
||||
t.Errorf("validate only enforces restrictions on secret mounts when operation==create and subresource==''. Unexpected error: %v", err)
|
||||
}
|
||||
|
||||
+ pod2 = &api.Pod{
|
||||
+ Spec: api.PodSpec{
|
||||
+ ServiceAccountName: DefaultServiceAccountName,
|
||||
+ InitContainers: []api.Container{
|
||||
+ {
|
||||
+ Name: "container-1",
|
||||
+ EnvFrom: []api.EnvFromSource{
|
||||
+ {
|
||||
+ SecretRef: &api.SecretEnvSource{
|
||||
+ LocalObjectReference: api.LocalObjectReference{
|
||||
+ Name: "foo"}}}},
|
||||
+ },
|
||||
+ },
|
||||
+ },
|
||||
+ }
|
||||
+ attrs = admission.NewAttributesRecord(pod2, nil, api.Kind("Pod").WithVersion("version"), ns, "myname", api.Resource("pods").WithVersion("version"), "", admission.Update, &metav1.UpdateOptions{}, false, nil)
|
||||
+ if err := admissiontesting.WithReinvocationTesting(t, admit).Admit(context.TODO(), attrs, nil); err != nil {
|
||||
+ t.Errorf("admit only enforces restrictions on secret mounts when operation==create. Unexpected error: %v", err)
|
||||
+ }
|
||||
+ attrs = admission.NewAttributesRecord(pod2, nil, api.Kind("Pod").WithVersion("version"), ns, "myname", api.Resource("pods").WithVersion("version"), "", admission.Create, &metav1.CreateOptions{}, false, nil)
|
||||
+ if err := admit.Validate(context.TODO(), attrs, nil); err == nil || !strings.Contains(err.Error(), "with envFrom") {
|
||||
+ t.Errorf("validate only enforces restrictions on secret mounts when operation==create and subresource==''. Unexpected error: %v", err)
|
||||
+ }
|
||||
+
|
||||
pod2 = &api.Pod{
|
||||
Spec: api.PodSpec{
|
||||
ServiceAccountName: DefaultServiceAccountName,
|
||||
@@ -708,6 +787,27 @@ func TestRejectsUnreferencedSecretVolumes(t *testing.T) {
|
||||
if err := admit.Validate(context.TODO(), attrs, nil); err == nil || !strings.Contains(err.Error(), "with envVar") {
|
||||
t.Errorf("validate enforces restrictions on secret mounts when operation==update and subresource==ephemeralcontainers. Unexpected error: %v", err)
|
||||
}
|
||||
+
|
||||
+ pod2 = &api.Pod{
|
||||
+ Spec: api.PodSpec{
|
||||
+ ServiceAccountName: DefaultServiceAccountName,
|
||||
+ EphemeralContainers: []api.EphemeralContainer{
|
||||
+ {
|
||||
+ EphemeralContainerCommon: api.EphemeralContainerCommon{
|
||||
+ Name: "container-2",
|
||||
+ EnvFrom: []api.EnvFromSource{{
|
||||
+ SecretRef: &api.SecretEnvSource{
|
||||
+ LocalObjectReference: api.LocalObjectReference{
|
||||
+ Name: "foo"}}}},
|
||||
+ },
|
||||
+ },
|
||||
+ },
|
||||
+ },
|
||||
+ }
|
||||
+ attrs = admission.NewAttributesRecord(pod2, nil, api.Kind("Pod").WithVersion("version"), ns, "myname", api.Resource("pods").WithVersion("version"), "ephemeralcontainers", admission.Update, &metav1.UpdateOptions{}, false, nil)
|
||||
+ if err := admit.Validate(context.TODO(), attrs, nil); err == nil || !strings.Contains(err.Error(), "with envFrom") {
|
||||
+ t.Errorf("validate enforces restrictions on secret mounts when operation==update and subresource==ephemeralcontainers. Unexpected error: %v", err)
|
||||
+ }
|
||||
}
|
||||
|
||||
func TestAllowUnreferencedSecretVolumesForPermissiveSAs(t *testing.T) {
|
||||
|
|
@ -36,6 +36,7 @@ SRC_URI:append = " \
|
|||
file://99-kubernetes.conf \
|
||||
file://CVE-2025-5187.patch \
|
||||
file://CVE-2024-10220.patch \
|
||||
file://CVE-2024-3177.patch \
|
||||
"
|
||||
|
||||
DEPENDS += "rsync-native \
|
||||
|
|
|
|||
Loading…
Reference in New Issue
Block a user