-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/cri-o/cri-o | go | = 1.29.0 | 1.29.1 |
| github.com/cri-o/cri-o | go | >= 1.28.0, < 1.28.3 | 1.28.3 |
| github.com/cri-o/cri-o | go | < 1.27.3 | 1.27.3 |
The vulnerability stems from the FilterDisallowedAnnotations function's logic error shown in the commit diff. The original code used 'delete(toFilter, d)' when it should have used 'delete(toFilter, ann)', failing to properly filter out dangerous annotations. This matches the vulnerability description about improper annotation filtering allowing resource confinement bypass. The direct code fix in the security patch confirms this function was the root cause.