{"id":"OESA-2025-2281","summary":"kubernetes security update","details":"Container cluster management.\r\n\r\nSecurity Fix(es):\n\nA vulnerability exists in the NodeRestriction admission controller in Kubernetes clusters where node users can delete their corresponding node object by patching themselves with an OwnerReference to a cluster-scoped resource. If the OwnerReference resource does not exist or is subsequently deleted, the given node object will be deleted via garbage collection.(CVE-2025-5187)","modified":"2025-09-12T19:01:04.854635Z","published":"2025-09-12T14:26:12Z","upstream":["CVE-2025-5187"],"database_specific":{"severity":"Medium"},"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2281"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-5187"}],"affected":[{"package":{"name":"kubernetes","ecosystem":"openEuler:24.03-LTS-SP1","purl":"pkg:rpm/openEuler/kubernetes&distro=openEuler-24.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.29.1-13.oe2403sp1"}]}],"ecosystem_specific":{"src":["kubernetes-1.29.1-13.oe2403sp1.src.rpm"],"x86_64":["kubernetes-1.29.1-13.oe2403sp1.x86_64.rpm","kubernetes-client-1.29.1-13.oe2403sp1.x86_64.rpm","kubernetes-help-1.29.1-13.oe2403sp1.x86_64.rpm","kubernetes-kubeadm-1.29.1-13.oe2403sp1.x86_64.rpm","kubernetes-kubelet-1.29.1-13.oe2403sp1.x86_64.rpm","kubernetes-master-1.29.1-13.oe2403sp1.x86_64.rpm","kubernetes-node-1.29.1-13.oe2403sp1.x86_64.rpm"],"aarch64":["kubernetes-1.29.1-13.oe2403sp1.aarch64.rpm","kubernetes-client-1.29.1-13.oe2403sp1.aarch64.rpm","kubernetes-help-1.29.1-13.oe2403sp1.aarch64.rpm","kubernetes-kubeadm-1.29.1-13.oe2403sp1.aarch64.rpm","kubernetes-kubelet-1.29.1-13.oe2403sp1.aarch64.rpm","kubernetes-master-1.29.1-13.oe2403sp1.aarch64.rpm","kubernetes-node-1.29.1-13.oe2403sp1.aarch64.rpm"]},"database_specific":{"source":"https://repo.openeuler.org/security/data/osv/OESA-2025-2281.json"}}],"schema_version":"1.7.3"}