CVE-2022-0811

Source
https://cve.org/CVERecord?id=CVE-2022-0811
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-0811.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-0811
Aliases
Downstream
Related
Published
2022-03-16T15:15:16.123Z
Modified
2026-02-03T07:31:54.488210Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A flaw was found in CRI-O in the way it set kernel options for a pod. This issue allows anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime to achieve a container escape and arbitrary code execution as root on the cluster node, where the malicious pod was deployed.

References

Affected packages

Git / github.com/kubernetes-incubator/cri-o

Affected versions

v1.*
v1.19.0
v1.19.1
v1.19.2
v1.19.3
v1.19.4
v1.19.5
v1.20.0
v1.20.1
v1.20.2
v1.20.3
v1.20.4
v1.20.5
v1.20.6
v1.21.0
v1.21.1
v1.21.2
v1.21.3
v1.21.4
v1.21.5
v1.22.0
v1.22.1
v1.22.2
v1.23.0
v1.23.1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-0811.json"