Bug 2373839 (CVE-2025-4563) - CVE-2025-4563 kube-apiserver: NodeRestriction Admission Controller Dynamic Resource Allocation Bypass
Summary: CVE-2025-4563 kube-apiserver: NodeRestriction Admission Controller Dynamic Re...
Keywords:
Status: NEW
Alias: CVE-2025-4563
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2373847 2373848
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-06-19 08:55 UTC by OSIDB Bzimport
Modified: 2025-06-20 15:58 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-06-19 08:55:57 UTC
Dynamic Resource Allocation validation bypass in the NodeRestriction admission controller of Kubernetes. When the DynamicResourceAllocation feature gate is enabled, a flaw in the pod creation logic allows compromised nodes to bypass authorization checks and create mirror pods with access to unauthorized resources. The vulnerability arises from missing validation during pod creation, which can potentially lead to privilege escalation. Kubelet’s built-in checks typically prevent these pods from starting, limiting practical impact, though the logic gap still poses a security risk.


Note You need to log in before you can comment on or make changes to this bug.