First published: Tue Mar 01 2022(Updated: )
A flaw was found in CRI-O in the way it set kernel options for a pod. This issue allows anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime to achieve a container escape and arbitrary code execution as root on the cluster node, where the malicious pod was deployed.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/cri-o | <0:1.23.1-12.rhaos4.10.git1607c6e.el7 | 0:1.23.1-12.rhaos4.10.git1607c6e.el7 |
redhat/cri-o | <0:1.19.5-3.rhaos4.6.git91f8458.el8 | 0:1.19.5-3.rhaos4.6.git91f8458.el8 |
redhat/cri-o | <0:1.20.6-11.rhaos4.7.git76ea3d0.el8 | 0:1.20.6-11.rhaos4.7.git76ea3d0.el8 |
redhat/cri-o | <0:1.21.5-3.rhaos4.8.gitaf64931.el8 | 0:1.21.5-3.rhaos4.8.gitaf64931.el8 |
redhat/cri-o | <0:1.22.2-3.rhaos4.9.gitb030be8.el8 | 0:1.22.2-3.rhaos4.9.gitb030be8.el8 |
Kubernetes CRI-O | >=1.19.0<1.19.6 | |
Kubernetes CRI-O | >=1.20.0<1.20.7 | |
Kubernetes CRI-O | >=1.21.0<1.21.6 | |
Kubernetes CRI-O | >=1.22.0<1.22.3 | |
Kubernetes CRI-O | >=1.23.0<1.23.2 |
Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-0811 is a vulnerability in CRI-O that allows a container escape and arbitrary code execution as root on a Kubernetes cluster.
CVE-2022-0811 has a severity rating of 8.8 (Critical).
The affected software includes CRI-O versions up to 1.24.0, 1.23.2, 1.22.3, 1.21.6, and 1.20.7.
To fix CVE-2022-0811, update your CRI-O installation to version 1.24.0, 1.23.2, 1.22.3, 1.21.6, or 1.20.7.
You can find more information about CVE-2022-0811 in the Red Hat Bugzilla and Red Hat Security Advisories.