7.2 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): HIGH
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
Cri-o: arbitrary command injection via pod annotation
A flaw was found in cri-o, where an arbitrary systemd property can be injected via a Pod annotation. Any user who can create a pod with an arbitrary annotation may perform an arbitrary action on the host system.
References
-
-
-
-
-
-
-
-
-
-
-
-
-
https://github.com/opencontainers/runc/pull/4217 x_transferred
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
https://github.com/opencontainers/runc/pull/4217 x_transferred
-
-
-
-
-
-
-
-
-
-
-
-
-
https://github.com/opencontainers/runc/pull/4217 x_transferred
-
-
-
-
-
-
-
-
-
-
-
-
-
https://github.com/opencontainers/runc/pull/4217 x_transferred
-
-
-
-
-
-
-
-
-
-
-
-
-
https://github.com/opencontainers/runc/pull/4217 x_transferred
-
-
-
-
-
-
-
-
-
-
-
-
-
https://github.com/opencontainers/runc/pull/4217 x_transferred
-
-
-
-
-
-
-
-
-
-
-
-
-
https://github.com/opencontainers/runc/pull/4217 x_transferred
-
-
-
-
-
-
-
-
-
-
-
-
-
https://github.com/opencontainers/runc/pull/4217 x_transferred
Affected products
- ==1.28.5
- ==1.29.3
- ==1.30.0
- *
- ==1.27.5
- ==1.28.6
- ==1.29.4
- ==1.27.6
Matching in nixpkgs
pkgs.cri-o
Open Container Initiative-based implementation of the Kubernetes Container Runtime Interface
pkgs.cri-o-unwrapped
Open Container Initiative-based implementation of the Kubernetes Container Runtime Interface
Package maintainers
-
@saschagrunert Sascha Grunert <mail@saschagrunert.de>
-
@vdemeester Vincent Demeester <vincent@sbr.pm>