A flaw was found in cri-o, where an arbitrary systemd property can be injected via a Pod annotation. Any user who can create a pod with an arbitrary annotation may perform an arbitrary action on the host system.
A flaw was found in cri-o, where an arbitrary systemd property can be injected via a Pod annotation. Any user who can create a pod with an arbitrary annotation may perform an arbitrary action on the host system.
| Vendor | Product | Versions |
|---|---|---|
| ? | ? | 1.27.5, 1.27.6, 1.28.5, 1.28.6, 1.29.3, 1.29.4, 1.30.0 |
| Red Hat | Red Hat OpenShift Container Platform 4.12 | 0:1.25.5-16.2.rhaos4.12.gitcb09013.el8 |
| Red Hat | Red Hat OpenShift Container Platform 4.13 | 0:1.26.5-16.2.rhaos4.13.git67e2a9d.el9 |
| Red Hat | Red Hat OpenShift Container Platform 4.14 | 0:1.27.6-2.rhaos4.14.gitb3bd0bf.el9 |
| Red Hat | Red Hat OpenShift Container Platform 4.15 | 0:1.28.6-2.rhaos4.15.git77bbb1c.el8 |
| Red Hat | Red Hat OpenShift Container Platform 3.11 | unspecified |
Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.