CVE-2022-0811

Source
https://cve.org/CVERecord?id=CVE-2022-0811
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-0811.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-0811
Aliases
Downstream
Published
2022-03-16T14:03:40Z
Modified
2026-05-15T04:03:52.275458395Z
Summary
[none]
Details

A flaw was found in CRI-O in the way it set kernel options for a pod. This issue allows anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime to achieve a container escape and arbitrary code execution as root on the cluster node, where the malicious pod was deployed.

Database specific
{
    "cwe_ids": [
        "CWE-94"
    ],
    "cna_assigner": "redhat",
    "unresolved_ranges": [
        {
            "source": "AFFECTED_FIELD",
            "extracted_events": [
                {
                    "last_affected": "cri-o 1.24.0, cri-o 1.23.2, cri-o 1.22.3, cri-o 1.21.6, cri-o 1.20.7, cri-o 1.19.6"
                }
            ]
        }
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/0xxx/CVE-2022-0811.json"
}
References

Affected packages