OESA-2024-1251

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1251
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2024-1251.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2024-1251
Upstream
Published
2024-03-08T11:07:09Z
Modified
2025-08-12T05:13:41.036145Z
Summary
cri-o security update
Details

Open Container Initiative-based implementation of Kubernetes Container Runtime Interface.

Security Fix(es):

Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.(CVE-2022-2995)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:22.03-LTS-SP1 / cri-o

Package

Name
cri-o
Purl
pkg:rpm/openEuler/cri-o&distro=openEuler-22.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.23.2-2.oe2203sp1

Ecosystem specific

{
    "aarch64": [
        "cri-o-1.23.2-2.oe2203sp1.aarch64.rpm",
        "cri-o-debuginfo-1.23.2-2.oe2203sp1.aarch64.rpm",
        "cri-o-debugsource-1.23.2-2.oe2203sp1.aarch64.rpm"
    ],
    "x86_64": [
        "cri-o-1.23.2-2.oe2203sp1.x86_64.rpm",
        "cri-o-debuginfo-1.23.2-2.oe2203sp1.x86_64.rpm",
        "cri-o-debugsource-1.23.2-2.oe2203sp1.x86_64.rpm"
    ],
    "src": [
        "cri-o-1.23.2-2.oe2203sp1.src.rpm"
    ]
}