Kubernetes Cri-o 1.20.0 -

CPE Details

Kubernetes Cri-o 1.20.0 -
1.20.0
2022-03-22
16h26 +00:00
2022-03-24
17h17 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:kubernetes:cri-o:1.20.0:-:*:*:*:*:*:*

Informations

Vendor

kubernetes

Product

cri-o

Version

1.20.0

Update

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-1708 2022-06-07 15h43 +00:00 A vulnerability was found in CRI-O that causes memory or disk space exhaustion on the node for anyone with access to the Kube API. The ExecSync request runs commands in a container and logs the output of the command. This output is then read by CRI-O after command execution, and it is read in a manner where the entire file corresponding to the output of the command is read in. Thus, if the output of the command is large it is possible to exhaust the memory or the disk space of the node when CRI-O reads the output of the command. The highest threat from this vulnerability is system availability.
7.5
High
CVE-2022-0811 2022-03-16 13h03 +00:00 A flaw was found in CRI-O in the way it set kernel options for a pod. This issue allows anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime to achieve a container escape and arbitrary code execution as root on the cluster node, where the malicious pod was deployed.
8.8
High