Bug 2331984

Summary: CVE-2024-45337 kubernetes1.29: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto [fedora-41]
Product: [Fedora] Fedora Reporter: Avinash Hanwate <ahanwate>
Component: kubernetes1.29Assignee: Brad Smith <bradley.g.smith>
Status: CLOSED NOTABUG QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: 41CC: bradley.g.smith, go-sig
Target Milestone: ---Keywords: Security, SecurityTracking
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard: {"flaws": ["d4b62e16-e97d-4967-82ea-268c1341436b"]}
Fixed In Version: Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2024-12-12 15:15:50 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2331720    

Description Avinash Hanwate 2024-12-12 08:35:44 UTC
More information about this security flaw is available in the following bug:

https://bugzilla.redhat.com/show_bug.cgi?id=2331720

Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.

Comment 1 Brad Smith 2024-12-12 15:15:50 UTC
See discussion at https://github.com/kubernetes/kubernetes/issues/129164 for details.

"more specifically: we only use the ssh client in a test suite to access temporary test VMs, we don't have any attempts at implementing an ssh server at all, let alone that specific functionality."

and

"Only the folks who are using PublicKeyCallback API are affected. We don't use that API in kubernetes/kubernetes and our only use of the entire package is in a test suite.

Based on the above, deliverables/binaries from kubernetes/kubernetes are NOT affected."

"