{"id":"CVE-2024-3154","details":"A flaw was found in cri-o, where an arbitrary systemd property can be injected via a Pod annotation. Any user who can create a pod with an arbitrary annotation may perform an arbitrary action on the host system.","aliases":["GHSA-2cgq-h8xw-2v5j","GO-2024-2791"],"modified":"2026-05-04T08:46:17.278668Z","published":"2024-04-26T04:15:09.217Z","withdrawn":"2026-05-04T08:46:17.278668Z","related":["CGA-h76v-2xh7-hm37","GHSA-2cgq-h8xw-2v5j","openSUSE-SU-2024:14334-1"],"references":[{"type":"WEB","url":"https://github.com/opencontainers/runtime-spec/blob/main/features.md#unsafe-annotations-in-configjson"},{"type":"WEB","url":"https://access.redhat.com/security/cve/CVE-2024-3154"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:2669"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:2672"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:2784"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:3496"},{"type":"ADVISORY","url":"https://github.com/cri-o/cri-o/security/advisories/GHSA-2cgq-h8xw-2v5j"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2272532"},{"type":"FIX","url":"https://github.com/opencontainers/runc/pull/4217"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-3154.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}]}