Assigner | redhat |
Reserved | 2024-04-01 |
Published | 2024-04-26 |
Updated | 2024-06-05 |
Description
A flaw was found in cri-o, where an arbitrary systemd property can be injected via a Pod annotation. Any user who can create a pod with an arbitrary annotation may perform an arbitrary action on the host system.
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
Problem types
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Product status
0:1.25.5-16.2.rhaos4.12.gitcb09013.el8 before *
0:1.26.5-16.2.rhaos4.13.git67e2a9d.el8 before *
0:1.27.6-2.rhaos4.14.gitb3bd0bf.el9 before *
0:1.28.6-2.rhaos4.15.git77bbb1c.el8 before *
Timeline
2024-04-01: | Reported to Red Hat. |
2024-04-22: | Made public. |
Credits
Red Hat would like to thank Akihiro Suda and Cédric Clerget for reporting this issue. Upstream acknowledges the CRI-O team as the original reporter.
References
https://access.redhat.com/errata/RHSA-2024:2669 (RHSA-2024:2669)
https://access.redhat.com/errata/RHSA-2024:2672 (RHSA-2024:2672)
https://access.redhat.com/errata/RHSA-2024:2784 (RHSA-2024:2784)
https://access.redhat.com/errata/RHSA-2024:3496 (RHSA-2024:3496)
https://access.redhat.com/security/cve/CVE-2024-3154
https://bugzilla.redhat.com/show_bug.cgi?id=2272532 (RHBZ#2272532)
https://github.com/cri-o/cri-o/security/advisories/GHSA-2cgq-h8xw-2v5j
https://github.com/opencontainers/runc/pull/4217