Loading HuntDB...

GHSA-p4rx-7wvg-fwrc

GitHub Security Advisory

CRI-O's pods can break out of resource confinement on cgroupv2

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

### Impact
_What kind of vulnerability is it? Who is impacted?_
All versions of CRI-O running on cgroupv2 nodes.
Unchecked access to an experimental annotation allows a container to be unconfined. Back in 2021, [support was added](https://github.com/cri-o/cri-o/pull/4479) to support an experimental annotation that allows a user to request special resources in cgroupv2. It was supposed to be gated by an experimental annotation: `io.kubernetes.cri-o.UnifiedCgroup`, which was supposed to be filtered from the [list of allowed annotations](https://github.com/cri-o/cri-o/blob/main/pkg/config/workloads.go#L103-L107) . However, there is a bug in this code which allows any user to specify this annotation, regardless of whether it's enabled on the node. The consequences of this are a pod can specify any amount of memory/cpu and get it, circumventing the kubernetes scheduler, and potentially be able to DOS a node.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
1.29.1, 1.28.3, 1.27.3

### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
use cgroupv1

### References
_Are there any links users can visit to find out more?_

Affected Packages

Go github.com/cri-o/cri-o
Affected versions: 1.29.0 (fixed in 1.29.1)
Go github.com/cri-o/cri-o
Affected versions: 1.28.0 (fixed in 1.28.3)
Go github.com/cri-o/cri-o
Affected versions: 0 (fixed in 1.27.3)

Related CVEs

Key Information

GHSA ID
GHSA-p4rx-7wvg-fwrc
Published
January 10, 2024 3:27 PM
Last Modified
January 10, 2024 3:27 PM
CVSS Score
5.0 /10
Primary Ecosystem
Go
Primary Package
github.com/cri-o/cri-o
GitHub Reviewed
✓ Yes

Dataset

Last updated: June 18, 2025 6:25 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.