Kubernetes

Cri-o

10 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.26%
  • Published 12.06.2024 09:15:19
  • Last modified 23.06.2025 14:15:26

A flaw was found in cri-o. A malicious container can create a symbolic link to arbitrary files on the host via directory traversal (“../“). This flaw allows the container to read and write to arbitrary files on the host system.

  • EPSS 0.04%
  • Published 25.09.2023 20:15:10
  • Last modified 21.11.2024 07:35:01

A vulnerability was found in cri-o. This issue allows the addition of arbitrary lines into /etc/passwd by use of a specially crafted environment variable.

  • EPSS 0.02%
  • Published 15.09.2023 14:15:08
  • Last modified 21.11.2024 07:19:35

The version of cri-o as released for Red Hat OpenShift Container Platform 4.9.48, 4.10.31, and 4.11.6 via RHBA-2022:6316, RHBA-2022:6257, and RHBA-2022:6658, respectively, included an incorrect version of cri-o missing the fix for CVE-2022-27652, whi...

Exploit
  • EPSS 0.03%
  • Published 19.09.2022 20:15:12
  • Last modified 29.05.2025 16:15:28

Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used t...

Exploit
  • EPSS 0.5%
  • Published 07.06.2022 18:15:11
  • Last modified 21.11.2024 06:41:17

A vulnerability was found in CRI-O that causes memory or disk space exhaustion on the node for anyone with access to the Kube API. The ExecSync request runs commands in a container and logs the output of the command. This output is then read by CRI-O...

  • EPSS 0.02%
  • Published 18.04.2022 17:15:16
  • Last modified 21.11.2024 06:56:06

A flaw was found in cri-o, where containers were incorrectly started with non-empty default permissions. A vulnerability was found in Moby (Docker Engine) where containers started incorrectly with non-empty inheritable Linux process capabilities. Thi...

  • EPSS 21.22%
  • Published 16.03.2022 15:15:16
  • Last modified 21.11.2024 06:39:26

A flaw was found in CRI-O in the way it set kernel options for a pod. This issue allows anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime to achieve a container escape and arbitrary code execution as root on the c...

  • EPSS 0.08%
  • Published 09.02.2022 23:15:16
  • Last modified 21.11.2024 06:38:51

An incorrect sysctls validation vulnerability was found in CRI-O 1.18 and earlier. The sysctls from the list of "safe" sysctls specified for the cluster will be applied to the host if an attacker is able to create a pod with a hostIPC and hostNetwork...

  • EPSS 0.32%
  • Published 25.11.2019 11:15:11
  • Last modified 21.11.2024 04:27:37

A flaw was found in cri-o, as a result of all pod-related processes being placed in the same memory cgroup. This can result in container management (conmon) processes being killed if a workload process triggers an out-of-memory (OOM) condition for th...

  • EPSS 0.93%
  • Published 18.05.2018 18:29:00
  • Last modified 21.11.2024 03:39:59

Kubernetes CRI-O version prior to 1.9 contains a Privilege Context Switching Error (CWE-270) vulnerability in the handling of ambient capabilities that can result in containers running with elevated privileges, allowing users abilities they should no...