Description
A flaw was found in CRI-O that involves an experimental annotation leading to a container being unconfined. This may allow a pod to specify and get any amount of memory/cpu, circumventing the kubernetes scheduler and potentially resulting in a denial of service in the node.
Published: 2024-01-09
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-0390 A flaw was found in CRI-O that involves an experimental annotation leading to a container being unconfined. This may allow a pod to specify and get any amount of memory/cpu, circumventing the kubernetes scheduler and potentially resulting in a denial of service in the node.
Github GHSA Github GHSA GHSA-p4rx-7wvg-fwrc CRI-O's pods can break out of resource confinement on cgroupv2
History

Tue, 17 Jun 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Redhat Enterprise Linux Openshift Openshift Container Platform
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-11-20T18:05:55.102Z

Reserved: 2023-12-04T06:23:22.231Z

Link: CVE-2023-6476

cve-icon Vulnrichment

Updated: 2024-08-02T08:28:21.863Z

cve-icon NVD

Status : Modified

Published: 2024-01-09T22:15:43.610

Modified: 2024-11-21T08:43:55.687

Link: CVE-2023-6476

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-01-09T21:00:00Z

Links: CVE-2023-6476 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses