CVE-2022-0811

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-0811
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-0811.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-0811
Aliases
Related
Published
2022-03-16T15:15:16Z
Modified
2025-02-19T03:25:21.952374Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A flaw was found in CRI-O in the way it set kernel options for a pod. This issue allows anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime to achieve a container escape and arbitrary code execution as root on the cluster node, where the malicious pod was deployed.

References

Affected packages

Git / github.com/cri-o/cri-o

Affected ranges

Type
GIT
Repo
https://github.com/cri-o/cri-o
Events
Type
GIT
Repo
https://github.com/kubernetes-incubator/cri-o
Events

Affected versions

v1.*

v1.19.0
v1.19.1
v1.19.2
v1.19.3
v1.19.4
v1.19.5
v1.20.0
v1.20.1
v1.20.2
v1.20.3
v1.20.4
v1.20.5
v1.20.6