CVE-2022-0811

A flaw was found in CRI-O in the way it set kernel options for a pod. This issue allows anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime to achieve a container escape and arbitrary code execution as root on the cluster node, where the malicious pod was deployed.
Code Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.8 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 95%
VendorProductVersion
kubernetescri-o
1.19.0 ≤
𝑥
< 1.19.6
kubernetescri-o
1.20.0 ≤
𝑥
< 1.20.7
kubernetescri-o
1.21.0 ≤
𝑥
< 1.21.6
kubernetescri-o
1.22.0 ≤
𝑥
< 1.22.3
kubernetescri-o
1.23.0 ≤
𝑥
< 1.23.2
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
cri-o
oracular
dne
noble
dne
jammy
dne
focal
dne