A flaw was found in CRI-O that involves an experimental annotation leading to a container being unconfined. This may allow a pod to specify and get any amount of memory/cpu, circumventing the kubernetes scheduler and potentially resulting in a denial of service in the node.
The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2024:0195 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:0207 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2023-6476 | vdb entry vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2253994 | vendor advisory issue tracking |