kubernetes allows nodes to bypass dynamic resource allocation authorization checks
Low severity
GitHub Reviewed
Published
Jun 23, 2025
to the GitHub Advisory Database
•
Updated Jun 23, 2025
Package
Affected versions
>= 1.32.0, <= 1.32.5
>= 1.33.0, <= 1.33.1
Patched versions
1.32.6
1.33.2
Description
Published by the National Vulnerability Database
Jun 23, 2025
Published to the GitHub Advisory Database
Jun 23, 2025
Reviewed
Jun 23, 2025
Last updated
Jun 23, 2025
A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation.
References