vulnerability
Arch Linux: Privilege escalation (CVE-2025-4563)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 3 | (AV:N/AC:L/Au:M/C:N/I:N/A:P) | Jun 23, 2025 | Jul 11, 2025 | Feb 12, 2026 |
Severity
3
CVSS
(AV:N/AC:L/Au:M/C:N/I:N/A:P)
Published
Jun 23, 2025
Added
Jul 11, 2025
Modified
Feb 12, 2026
Description
A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation.
Solution
arch-linux-upgrade-latest
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.