A flaw was found in CRI-O that involves an experimental annotation leading to a container being unconfined. This may allow a pod to specify and get any amount of memory/cpu, circumventing the kubernetes scheduler and potentially resulting in a denial of service in the node.

Subscriptions

Vendors Products
Enterprise Linux Subscribe
Openshift Subscribe
Openshift Container Platform Subscribe

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-0390 A flaw was found in CRI-O that involves an experimental annotation leading to a container being unconfined. This may allow a pod to specify and get any amount of memory/cpu, circumventing the kubernetes scheduler and potentially resulting in a denial of service in the node.
Github GHSA Github GHSA GHSA-p4rx-7wvg-fwrc CRI-O's pods can break out of resource confinement on cgroupv2
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 17 Jun 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-11-20T18:05:55.102Z

Reserved: 2023-12-04T06:23:22.231Z

Link: CVE-2023-6476

cve-icon Vulnrichment

Updated: 2024-08-02T08:28:21.863Z

cve-icon NVD

Status : Modified

Published: 2024-01-09T22:15:43.610

Modified: 2024-11-21T08:43:55.687

Link: CVE-2023-6476

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-01-09T21:00:00Z

Links: CVE-2023-6476 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses