A flaw was found in github.com/openshift/apiserver-library-go, used in OpenShift 4.12 and 4.11, that contains an issue that can allow low-privileged users to set the seccomp profile for pods they control to "unconfined." By default, the seccomp profile used in the restricted-v2 Security Context Constraint (SCC) is "runtime/default," allowing users to disable seccomp for pods they can create and modify.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 01 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-04-01T15:07:42.482Z

Reserved: 2023-01-12T00:00:00.000Z

Link: CVE-2023-0229

cve-icon Vulnrichment

Updated: 2024-08-02T05:02:44.191Z

cve-icon NVD

Status : Modified

Published: 2023-01-26T21:18:06.900

Modified: 2025-04-01T15:15:57.390

Link: CVE-2023-0229

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-01-12T00:00:00Z

Links: CVE-2023-0229 - Bugzilla

cve-icon OpenCVE Enrichment

No data.