@@ -11,6 +11,54 @@ tags: ["security", "cve", "advisories"]
1111Security advisories supplement <VersionedLink text =" security bulletins " url =" /security-bulletins/reports/ " />, providing
1212additional details regarding vulnerabilities and offering remediation steps.
1313
14+ ## Security Advisory 003 - Self-Deleting Nodes with OwnerReference
15+
16+ - ** Release Date** : August 14, 2025
17+ - ** Last Updated** : August 14, 2025
18+ - ** Severity** : Medium (5.4)
19+ - ** Affected Versions** : v1.31.0 - v1.31.11, v1.32.0 - v1.32.7, and v1.33.0 - v1.33.3
20+
21+ ### Summary
22+
23+ A recently disclosed vulnerability in the ` NodeRestriction ` admission controller allows node users to delete their own
24+ ` Node ` object by patching it with an ` OwnerReference ` to a cluster-scoped resource.
25+
26+ Normally, node users are authorized to create and patch their own ` Node ` object but not delete it. However, the
27+ ` NodeRestriction ` controller does not block patches that set ` OwnerReferences ` , enabling a compromised node to delete
28+ and then recreate its own ` Node ` object.
29+
30+ This recreation can bypass the usual restrictions on modifying taints or labels, allowing an attacker to change node
31+ scheduling behavior and control which pods run on the compromised node.
32+
33+ This vulnerability affects all clusters using an affected Kubernetes version across all Palette Enterprise and Palette
34+ VerteX releases.
35+
36+ For additional information regarding this advisory, refer to the
37+ [ Kubernetes GitHub issue] ( https://github.com/kubernetes/kubernetes/issues/133471 ) .
38+
39+ ### Recommended Actions
40+
41+ ::: info
42+
43+ - This workaround will result in a cluster [ repave] ( ../../glossary-all.md#repavement ) .
44+ - This workaround is not applicable for cloud-managed clusters such as EKS, GKE, and AKS. Refer to your cloud provider
45+ for steps on patching cloud-managed clusters.
46+
47+ :::
48+
49+ In the Kubernetes layer of the [ infrastructure cluster profile] ( ../../profiles/profiles.md ) for the affected cluster,
50+ enable the ` OwnerReferencesPermissionEnforcement ` admission controller by adding it to the ` enable-admission-plugins `
51+ argument under the ` apiServer ` section. After saving your changes, make sure to
52+ [ update] ( ../../clusters/cluster-management/cluster-updates.md ) all affected clusters.
53+
54+ When enabled, this admission controller prevents any user or service account from modifying an object’s
55+ ` OwnerReferences ` unless they have delete permission on the owner object (the object referenced in ` OwnerReferences ` ).
56+
57+ ### Roadmap
58+
59+ Patch releases for Kubernetes versions 1.31, 1.32, and 1.33 that address this vulnerability will be available in future
60+ Palette Enterprise and Palette VerteX releases. No patches will be available for 1.30 and older versions.
61+
1462## Security Advisory 002 - Kubernetes Race Condition
1563
1664This advisory outlines security vulnerabilities related to the use of the ` os.RemoveAll ` function in Go, which affects
0 commit comments