Skip to content

Commit 05995c2

Browse files
docs: Security Advisory 3: Self-Deleting Nodes with OwnerReference (#7830)
* Adding Security Advisory 3 * Update docs/docs-content/security-bulletins/security-advisories/security-advisories.md Co-authored-by: caroldelwing <carolina.delwing@spectrocloud.com> --------- Co-authored-by: caroldelwing <carolina.delwing@spectrocloud.com>
1 parent a70af4e commit 05995c2

File tree

1 file changed

+48
-0
lines changed

1 file changed

+48
-0
lines changed

docs/docs-content/security-bulletins/security-advisories/security-advisories.md

Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,54 @@ tags: ["security", "cve", "advisories"]
1111
Security advisories supplement <VersionedLink text="security bulletins" url="/security-bulletins/reports/" />, providing
1212
additional details regarding vulnerabilities and offering remediation steps.
1313

14+
## Security Advisory 003 - Self-Deleting Nodes with OwnerReference
15+
16+
- **Release Date**: August 14, 2025
17+
- **Last Updated**: August 14, 2025
18+
- **Severity**: Medium (5.4)
19+
- **Affected Versions**: v1.31.0 - v1.31.11, v1.32.0 - v1.32.7, and v1.33.0 - v1.33.3
20+
21+
### Summary
22+
23+
A recently disclosed vulnerability in the `NodeRestriction` admission controller allows node users to delete their own
24+
`Node` object by patching it with an `OwnerReference` to a cluster-scoped resource.
25+
26+
Normally, node users are authorized to create and patch their own `Node` object but not delete it. However, the
27+
`NodeRestriction` controller does not block patches that set `OwnerReferences`, enabling a compromised node to delete
28+
and then recreate its own `Node` object.
29+
30+
This recreation can bypass the usual restrictions on modifying taints or labels, allowing an attacker to change node
31+
scheduling behavior and control which pods run on the compromised node.
32+
33+
This vulnerability affects all clusters using an affected Kubernetes version across all Palette Enterprise and Palette
34+
VerteX releases.
35+
36+
For additional information regarding this advisory, refer to the
37+
[Kubernetes GitHub issue](https://github.com/kubernetes/kubernetes/issues/133471).
38+
39+
### Recommended Actions
40+
41+
:::info
42+
43+
- This workaround will result in a cluster [repave](../../glossary-all.md#repavement).
44+
- This workaround is not applicable for cloud-managed clusters such as EKS, GKE, and AKS. Refer to your cloud provider
45+
for steps on patching cloud-managed clusters.
46+
47+
:::
48+
49+
In the Kubernetes layer of the [infrastructure cluster profile](../../profiles/profiles.md) for the affected cluster,
50+
enable the `OwnerReferencesPermissionEnforcement` admission controller by adding it to the `enable-admission-plugins`
51+
argument under the `apiServer` section. After saving your changes, make sure to
52+
[update](../../clusters/cluster-management/cluster-updates.md) all affected clusters.
53+
54+
When enabled, this admission controller prevents any user or service account from modifying an object’s
55+
`OwnerReferences` unless they have delete permission on the owner object (the object referenced in `OwnerReferences`).
56+
57+
### Roadmap
58+
59+
Patch releases for Kubernetes versions 1.31, 1.32, and 1.33 that address this vulnerability will be available in future
60+
Palette Enterprise and Palette VerteX releases. No patches will be available for 1.30 and older versions.
61+
1462
## Security Advisory 002 - Kubernetes Race Condition
1563

1664
This advisory outlines security vulnerabilities related to the use of the `os.RemoveAll` function in Go, which affects

0 commit comments

Comments
 (0)