CVE-2023-6476 (https://bugzilla.redhat.com/show_bug.cgi?id=2253994): A flaw was found in CRI-O that involves an experimental annotation leading to a container being unconfined. This may allow a pod to specify and get any amount of memory/cpu, circumventing the kubernetes scheduler and potentially resulting in a denial of service in the node. Fix in 1.27.3 and 1.28.3 according to the changelogs, please bump: https://github.com/cri-o/cri-o/releases/tag/v1.27.3 https://github.com/cri-o/cri-o/releases/tag/v1.28.3
Dropped 1.26.0: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=dd3df74b260c383ca385badbf0d60b4806f26318
All done. Thanks!