Количество 8
Количество 8
GHSA-6x2m-w449-qwx7
Code Injection in CRI-O

CVE-2022-0811
A flaw was found in CRI-O in the way it set kernel options for a pod. This issue allows anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime to achieve a container escape and arbitrary code execution as root on the cluster node, where the malicious pod was deployed.

CVE-2022-0811
A flaw was found in CRI-O in the way it set kernel options for a pod. This issue allows anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime to achieve a container escape and arbitrary code execution as root on the cluster node, where the malicious pod was deployed.

CVE-2022-0811
A flaw was found in CRI-O in the way it set kernel options for a pod. This issue allows anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime to achieve a container escape and arbitrary code execution as root on the cluster node, where the malicious pod was deployed.
CVE-2022-0811
A flaw was found in CRI-O in the way it set kernel options for a pod. ...
ELSA-2022-9229
ELSA-2022-9229: cri-o security update (IMPORTANT)
ELSA-2022-9228
ELSA-2022-9228: cri-o security update (IMPORTANT)

BDU:2022-01319
Уязвимость утилиты pinns прикладного программного интерфейса CRI-O Container Engine программного средства управления кластерами виртуальных машин Kubernetes, позволяющая нарушителю выйти из контейнера и получить root-доступ к хосту
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-6x2m-w449-qwx7 Code Injection in CRI-O | CVSS3: 8.8 | 27% Средний | больше 3 лет назад | |
![]() | CVE-2022-0811 A flaw was found in CRI-O in the way it set kernel options for a pod. This issue allows anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime to achieve a container escape and arbitrary code execution as root on the cluster node, where the malicious pod was deployed. | CVSS3: 8.8 | 27% Средний | больше 3 лет назад |
![]() | CVE-2022-0811 A flaw was found in CRI-O in the way it set kernel options for a pod. This issue allows anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime to achieve a container escape and arbitrary code execution as root on the cluster node, where the malicious pod was deployed. | CVSS3: 8.8 | 27% Средний | больше 3 лет назад |
![]() | CVE-2022-0811 A flaw was found in CRI-O in the way it set kernel options for a pod. This issue allows anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime to achieve a container escape and arbitrary code execution as root on the cluster node, where the malicious pod was deployed. | CVSS3: 8.8 | 27% Средний | больше 3 лет назад |
CVE-2022-0811 A flaw was found in CRI-O in the way it set kernel options for a pod. ... | CVSS3: 8.8 | 27% Средний | больше 3 лет назад | |
ELSA-2022-9229 ELSA-2022-9229: cri-o security update (IMPORTANT) | больше 3 лет назад | |||
ELSA-2022-9228 ELSA-2022-9228: cri-o security update (IMPORTANT) | больше 3 лет назад | |||
![]() | BDU:2022-01319 Уязвимость утилиты pinns прикладного программного интерфейса CRI-O Container Engine программного средства управления кластерами виртуальных машин Kubernetes, позволяющая нарушителю выйти из контейнера и получить root-доступ к хосту | CVSS3: 8.8 | 27% Средний | больше 3 лет назад |
Уязвимостей на страницу