We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A flaw was found in cri-o, where an arbitrary systemd property can be injected via a Pod annotation. Any user who can create a pod with an arbitrary annotation may perform an arbitrary action on the host system.
Reserved 2024-04-01 | Published 2024-04-26 | Updated 2024-09-16 | Assigner redhatImproper Neutralization of Special Elements used in a Command ('Command Injection')
2024-04-01: | Reported to Red Hat. |
2024-04-22: | Made public. |
Red Hat would like to thank Akihiro Suda and Cédric Clerget for reporting this issue. Upstream acknowledges the CRI-O team as the original reporter.
access.redhat.com/errata/RHSA-2024:2669 (RHSA-2024:2669)
access.redhat.com/errata/RHSA-2024:2672 (RHSA-2024:2672)
access.redhat.com/errata/RHSA-2024:2784 (RHSA-2024:2784)
access.redhat.com/errata/RHSA-2024:3496 (RHSA-2024:3496)
access.redhat.com/security/cve/CVE-2024-3154
bugzilla.redhat.com/show_bug.cgi?id=2272532 (RHBZ#2272532)
github.com/.../cri-o/security/advisories/GHSA-2cgq-h8xw-2v5j
github.com/opencontainers/runc/pull/4217
github.com/opencontainers/runtime-spec/blob/main/features.md
Support options