A flaw was found in CRI-O in the way it set kernel options for a pod. This issue allows anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime to achieve a container escape and arbitrary code execution as root on the cluster node, where the malicious pod was deployed.
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag:
List of frequently cited URLs
User | URL | Info Source | Date |
---|---|---|---|
LEOLAMCGILL14 | https://github.com/cri-o/cri-o/security/advisories/GHSA-6x2... | Source LEOLAMCGILL14 1626144266643996672 | 2023/02/16 |
List of frequently cited URLs
URL | Num of Times Referred to |
---|---|
www.reddit.com | 51 |
cvetrends.com | 48 |
cyberiqs.com | 38 |
thehackernews.com | 11 |
ASP.NET | 4 |
github.com | 3 |
sysdig.com | 3 |
opsmtrs.com | 3 |
blog.aquasec.com | 3 |
www.crowdstrike.com | 3 |
cloudsecurityalliance.org | 3 |
User | URL | Info Source |
---|---|---|
LEOLAMCGILL14 | github.com | Show Tweet |
Name | URL |
---|---|
spiarh/webhook-cve-2022-0811 | https://github.com/spiarh/webhook-cve-2022-0811 |
Name | URL |
---|---|
spiarh/webhook-cve-2022-0811 | github.com |