2022-03-25
ALT-BU-2022-4386-2
Branch p10 update bulletin.
Closed bugs
Не работает запуск обновления политик для определенного пользователя
Closed vulnerabilities
Published: 2022-03-18
BDU:2022-01319
Уязвимость утилиты pinns прикладного программного интерфейса CRI-O Container Engine программного средства управления кластерами виртуальных машин Kubernetes, позволяющая нарушителю выйти из контейнера и получить root-доступ к хосту
Severity: HIGH (8.8)Vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity: CRITICAL (9.0)Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C
References:
Published: 2022-03-16
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2022-0811
A flaw was found in CRI-O in the way it set kernel options for a pod. This issue allows anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime to achieve a container escape and arbitrary code execution as root on the cluster node, where the malicious pod was deployed.
Severity: CRITICAL (9.0)Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C
Severity: HIGH (8.8)Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
References:
Published: 2022-03-15
Modified: 2022-03-18
Modified: 2022-03-18
GHSA-6x2m-w449-qwx7
Code Injection in CRI-O
Severity: HIGH (8.8)Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
References:
- https://github.com/cri-o/cri-o/security/advisories/GHSA-6x2m-w449-qwx7
- https://nvd.nist.gov/vuln/detail/CVE-2022-0811
- https://access.redhat.com/security/cve/CVE-2022-0811
- https://bugs.gentoo.org/835336
- https://bugzilla.redhat.com/show_bug.cgi?id=2059475
- https://github.com/cri-o/cri-o
- https://www.crowdstrike.com/blog/cr8escape-zero-day-vulnerability-discovered-in-cri-o-container-engine-cve-2022-0811
Closed bugs
Неправильный порядок загрузки конфигурации из /etc/rsyslog.d
