CVE-2022-0811: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
(updated )
A flaw was found in CRI-O in the way it set kernel options for a pod. This issue allows anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime to achieve a container escape and arbitrary code execution as root on the cluster node, where the malicious pod was deployed.
References
- access.redhat.com/security/cve/CVE-2022-0811
- bugs.gentoo.org/835336
- bugzilla.redhat.com/show_bug.cgi?id=2059475
- github.com/advisories/GHSA-6x2m-w449-qwx7
- github.com/cri-o/cri-o/security/advisories/GHSA-6x2m-w449-qwx7
- nvd.nist.gov/vuln/detail/CVE-2022-0811
- www.crowdstrike.com/blog/cr8escape-zero-day-vulnerability-discovered-in-cri-o-container-engine-cve-2022-0811/
Detect and mitigate CVE-2022-0811 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →