CVE-2022-0811

EUVD-2022-1349
A flaw was found in CRI-O in the way it set kernel options for a pod. This issue allows anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime to achieve a container escape and arbitrary code execution as root on the cluster node, where the malicious pod was deployed.
Code Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.8 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 95%
Affected Products (NVD)
VendorProductVersion
kubernetescri-o
1.19.0 ≤
𝑥
< 1.19.6
kubernetescri-o
1.20.0 ≤
𝑥
< 1.20.7
kubernetescri-o
1.21.0 ≤
𝑥
< 1.21.6
kubernetescri-o
1.22.0 ≤
𝑥
< 1.22.3
kubernetescri-o
1.23.0 ≤
𝑥
< 1.23.2
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
cri-o
focal
dne
jammy
dne
noble
dne
oracular
dne