{"id":"CVE-2022-0811","details":"A flaw was found in CRI-O in the way it set kernel options for a pod. This issue allows anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime to achieve a container escape and arbitrary code execution as root on the cluster node, where the malicious pod was deployed.","aliases":["GHSA-6x2m-w449-qwx7","GO-2022-0354"],"modified":"2026-03-13T22:01:27.748878Z","published":"2022-03-16T15:15:16.123Z","related":["GHSA-6x2m-w449-qwx7"],"references":[{"type":"ADVISORY","url":"https://github.com/cri-o/cri-o/security/advisories/GHSA-6x2m-w449-qwx7"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2059475"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/kubernetes-incubator/cri-o","events":[{"introduced":"99c925bebdd9e392f2d575e25f2e6a1082e6c232"},{"fixed":"c12bb210e9888cf6160134c7e636ee952c45c05a"},{"introduced":"d388528dbed26b93c5bc1c89623607a1e597aa57"},{"fixed":"5d2fa3419f15655454edb94dfcc0993cb5a1521c"},{"introduced":"bc1ef35a932acc2f6f3b6d3eb19a4f68aa9423f6"},{"fixed":"c03e400ec69fb22256a1b9c8f3ae8011a3539582"},{"introduced":"6becad23eadd7dfdd25fd8df386bf3b706cf7758"},{"fixed":"d93b2dfb8d0f2ad0f8b9061d941e3b216baa5814"},{"introduced":"9b7f5ae815c22a1d754abfbc2890d8d4c10e240d"},{"fixed":"c0b2474b80fd0844b883729bda88961bed7b472b"}],"database_specific":{"versions":[{"introduced":"1.19.0"},{"fixed":"1.19.6"},{"introduced":"1.20.0"},{"fixed":"1.20.7"},{"introduced":"1.21.0"},{"fixed":"1.21.6"},{"introduced":"1.22.0"},{"fixed":"1.22.3"},{"introduced":"1.23.0"},{"fixed":"1.23.2"}]}}],"versions":["v1.19.0","v1.19.1","v1.19.2","v1.19.3","v1.19.4","v1.19.5","v1.20.0","v1.20.1","v1.20.2","v1.20.3","v1.20.4","v1.20.5","v1.20.6","v1.21.0","v1.21.1","v1.21.2","v1.21.3","v1.21.4","v1.21.5","v1.22.0","v1.22.1","v1.22.2","v1.23.0","v1.23.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-0811.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}