ALT-PU-2023-1528-2
Closed vulnerabilities
BDU:2022-03768
Уязвимость программы мониторинга связи между менеджером контейнеров и средой выполнения conmon, связанная с неконтролируемым потреблением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-02407
Уязвимость прикладного программного интерфейса CRI-O Container Engine программного средства управления кластерами виртуальных машин Kubernetes, позволяющая нарушителю раскрытию конфиденциальную информацию или изменить произвольные данные
BDU:2024-02430
Уязвимость прикладного программного интерфейса CRI-O Container Engine программного средства управления кластерами виртуальных машин Kubernetes, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2022-1708
A vulnerability was found in CRI-O that causes memory or disk space exhaustion on the node for anyone with access to the Kube API. The ExecSync request runs commands in a container and logs the output of the command. This output is then read by CRI-O after command execution, and it is read in a manner where the entire file corresponding to the output of the command is read in. Thus, if the output of the command is large it is possible to exhaust the memory or the disk space of the node when CRI-O reads the output of the command. The highest threat from this vulnerability is system availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=2085361
- https://github.com/cri-o/cri-o/commit/f032cf649ecc7e0c46718bd9e7814bfb317cb544
- https://github.com/cri-o/cri-o/security/advisories/GHSA-fcm2-6c3h-pg6j
- https://bugzilla.redhat.com/show_bug.cgi?id=2085361
- https://github.com/cri-o/cri-o/commit/f032cf649ecc7e0c46718bd9e7814bfb317cb544
- https://github.com/cri-o/cri-o/security/advisories/GHSA-fcm2-6c3h-pg6j
Modified: 2024-11-21
CVE-2022-27652
A flaw was found in cri-o, where containers were incorrectly started with non-empty default permissions. A vulnerability was found in Moby (Docker Engine) where containers started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs.
Modified: 2025-05-29
CVE-2022-2995
Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.
Modified: 2024-11-21
CVE-2022-4318
A vulnerability was found in cri-o. This issue allows the addition of arbitrary lines into /etc/passwd by use of a specially crafted environment variable.
- https://access.redhat.com/errata/RHSA-2023:1033
- https://access.redhat.com/errata/RHSA-2023:1503
- https://access.redhat.com/security/cve/CVE-2022-4318
- https://bugzilla.redhat.com/show_bug.cgi?id=2152703
- https://access.redhat.com/errata/RHSA-2023:1033
- https://access.redhat.com/errata/RHSA-2023:1503
- https://access.redhat.com/security/cve/CVE-2022-4318
- https://bugzilla.redhat.com/show_bug.cgi?id=2152703
Modified: 2022-04-28
GHSA-4hj2-r2pm-3hc6
Incorrect Default Permissions in CRI-O
GHSA-cm9x-c3rh-7rc4
CRI-O vulnerable to /etc/passwd tampering resulting in Privilege Escalation
- https://github.com/cri-o/cri-o/security/advisories/GHSA-cm9x-c3rh-7rc4
- https://nvd.nist.gov/vuln/detail/CVE-2022-4318
- https://github.com/cri-o/cri-o/pull/6450
- https://access.redhat.com/errata/RHSA-2023:1033
- https://access.redhat.com/errata/RHSA-2023:1503
- https://access.redhat.com/security/cve/CVE-2022-4318
- https://bugzilla.redhat.com/show_bug.cgi?id=2152703
- https://github.com/cri-o/cri-o
Modified: 2023-07-24
GHSA-fcm2-6c3h-pg6j
Node DOS by way of memory exhaustion through ExecSync request in CRI-O
Modified: 2022-09-22
GHSA-phjr-8j92-w5v7
CRI-O incorrect handling of supplementary groups may lead to sensitive information disclosure
