Vulnerability CVE-2022-0811: Information

Description

A flaw was found in CRI-O in the way it set kernel options for a pod. This issue allows anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime to achieve a container escape and arbitrary code execution as root on the cluster node, where the malicious pod was deployed.

Severity: HIGH (8.8) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Published: March 16, 2022
Modified: March 28, 2022
Error type identifier: CWE-94

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
cri-op91.20.7-alt11.20.7-alt1ALT-PU-2022-1573-1296972Fixed

References to Advisories, Solutions, and Tools

    1. Configuration 1

      cpe:2.3:a:kubernetes:cri-o:*:*:*:*:*:*:*:*
      Start including
      1.23.0
      End excliding
      1.23.2

      cpe:2.3:a:kubernetes:cri-o:*:*:*:*:*:*:*:*
      Start including
      1.22.0
      End excliding
      1.22.3

      cpe:2.3:a:kubernetes:cri-o:*:*:*:*:*:*:*:*
      Start including
      1.21.0
      End excliding
      1.21.6

      cpe:2.3:a:kubernetes:cri-o:*:*:*:*:*:*:*:*
      Start including
      1.20.0
      End excliding
      1.20.7

      cpe:2.3:a:kubernetes:cri-o:*:*:*:*:*:*:*:*
      Start including
      1.19.0
      End excliding
      1.19.6