Описание
A flaw was found in CRI-O in the way it set kernel options for a pod. This issue allows anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime to achieve a container escape and arbitrary code execution as root on the cluster node, where the malicious pod was deployed.
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra/focal | DNE | |
focal | DNE | |
jammy | DNE | |
noble | DNE | |
oracular | DNE | |
upstream | needs-triage |
Показывать по
Ссылки на источники
9 Critical
CVSS2
8.8 High
CVSS3
Связанные уязвимости
A flaw was found in CRI-O in the way it set kernel options for a pod. This issue allows anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime to achieve a container escape and arbitrary code execution as root on the cluster node, where the malicious pod was deployed.
A flaw was found in CRI-O in the way it set kernel options for a pod. This issue allows anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime to achieve a container escape and arbitrary code execution as root on the cluster node, where the malicious pod was deployed.
A flaw was found in CRI-O in the way it set kernel options for a pod. ...
9 Critical
CVSS2
8.8 High
CVSS3