We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation.
Reserved 2025-05-12 | Published 2025-06-23 | Updated 2025-06-23 | Assigner kubernetesCWE-20 Improper Input Validation
amitschendel
groups.google.com/...ernetes-security-announce/c/Zv84LMRuvMQ
github.com/kubernetes/kubernetes/issues/132151
Support options