Ce mail provient de l'extérieur, restons vigilants ===================================================================== CERT-Renater Note d'Information No. 2025/VULN093 _____________________________________________________________________ DATE : 13/02/2025 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Systems running kubelet versions prior to 1.32.2, 1.31.6, 1.30.10, 1.29.14. ===================================================================== https://groups.google.com/g/kubernetes-security-announce/c/KiODfu8i6w8 _____________________________________________________________________ Hello Kubernetes Community, A security issue was discovered in Kubernetes where a large number of container checkpoint requests made to the unauthenticated kubelet read-only HTTP endpoint may cause a Node Denial of Service by filling the Node's disk. This issue has been rated Medium (6.2) (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), and assigned CVE-2025-0426. Am I vulnerable? All clusters running an affected version listed below with the kubelet read-only HTTP port enabled and using a container runtime that supports the container checkpointing feature, such as CRI-O v1.25.0+ (with enable_criu_support set to true) or containerd v2.0+ with criu installed, are affected. Affected Versions kubelet v1.32.0 to v1.32.1 kubelet v1.31.0 to v1.31.5 kubelet v1.30.0 to v1.30.9 How do I mitigate this vulnerability? This issue can be mitigated by setting the ContainerCheckpoint feature gate to false in your kubelet configuration, disabling the kubelet read-only port, and limiting access to the kubelet API, or upgrading to a fixed version listed below, which enforces authentication for the kubelet Checkpoint API. Fixed Versions kubelet v1.32.2 kubelet v1.31.6 kubelet v1.30.10 kubelet v1.29.14 Note: Container checkpoint support was an off by default Alpha feature in v1.25-v1.29 Detection A large number of requests to the kubelet read-only HTTP server's /checkpoint endpoint, or a large number of checkpoints stored (by default) under /var/lib/kubelet/checkpoints on a Node may indicate an attempted Denial of Service attack using this bug. If you find evidence that this vulnerability has been exploited, please contact secu...@kubernetes.io Additional Details See the GitHub issue for more details: https://github.com/kubernetes/kubernetes/issues/130016 Acknowledgements This vulnerability was reported and fixed by Tim Allclair @tallclair from Google. The issue was coordinated by: Tim Allclair @tallclair Sascha Grunert saschagrunert@ Craig Ingram @cji Jordan Liggitt liggitt@ Thank You, Craig Ingram on behalf of the Kubernetes Security Response Committee ========================================================= + CERT-RENATER | tel : 01-53-94-20-44 + + 23/25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email:cert@support.renater.fr + =========================================================