Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/cri-o@1.19.5-3.rhaos4.6.git91f8458?arch=el7
Typerpm
Namespaceredhat
Namecri-o
Version1.19.5-3.rhaos4.6.git91f8458
Qualifiers
arch el7
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-11cw-axj8-vkdz
vulnerability_id VCID-11cw-axj8-vkdz
summary
Code Injection in CRI-O
### Impact
A flaw introduced in CRI-O version 1.19 which an attacker can use to bypass the safeguards and set arbitrary kernel parameters on the host. As a result, anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime can abuse the `kernel.core_pattern` kernel parameter to achieve container escape and arbitrary code execution as root on any node in the cluster.

### Patches
The patches will be present in 1.19.6, 1.20.7, 1.21.6, 1.22.3, 1.23.2, 1.24.0

### Workarounds
- Users can set manage_ns_lifecycle to false, which causes the sysctls to be configured by the OCI runtime, which typically filter these cases. This option is available in 1.20 and 1.19. Newer versions don't have this option.
- An admission webhook could be created to deny pods that specify a `+` in the sysctl value of a pod.
- A [PodSecurityPolicy](https://kubernetes.io/docs/tasks/administer-cluster/sysctl-cluster/#podsecuritypolicy) [deprecated] could be created, specifying all sysctls as forbidden like so: 
```
apiVersion: policy/v1beta1
kind: PodSecurityPolicy
metadata:
  name: sysctl-psp
spec:
  forbiddenSysctls:
    - "*"
```
However, this option will not work if any sysctls are required by any pods in the cluster.


### Credits
Credit for finding this vulnerability goes to John Walker and Manoj Ahuje of Crowdstrike. The CRI-O community deeply thanks them for the report.

### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the CRI-O repo](http://github.com/cri-o/cri-o/issues)
* To make a report, email your vulnerability to the private
[cncf-crio-security@lists.cncf.io](mailto:cncf-crio-security@lists.cncf.io) list
with the security details and the details expected for [all CRI-O bug
reports](https://github.com/cri-o/cri-o/blob/main/.github/ISSUE_TEMPLATE/bug-report.yml).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0811.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0811.json
1
reference_url https://access.redhat.com/security/cve/CVE-2022-0811
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2022-0811
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0811
reference_id
reference_type
scores
0
value 0.21337
scoring_system epss
scoring_elements 0.95704
published_at 2026-04-29T12:55:00Z
1
value 0.21337
scoring_system epss
scoring_elements 0.9567
published_at 2026-04-04T12:55:00Z
2
value 0.21337
scoring_system epss
scoring_elements 0.95672
published_at 2026-04-07T12:55:00Z
3
value 0.21337
scoring_system epss
scoring_elements 0.95681
published_at 2026-04-08T12:55:00Z
4
value 0.21337
scoring_system epss
scoring_elements 0.95685
published_at 2026-04-09T12:55:00Z
5
value 0.21337
scoring_system epss
scoring_elements 0.95689
published_at 2026-04-12T12:55:00Z
6
value 0.21337
scoring_system epss
scoring_elements 0.9569
published_at 2026-04-13T12:55:00Z
7
value 0.21337
scoring_system epss
scoring_elements 0.95699
published_at 2026-04-16T12:55:00Z
8
value 0.21337
scoring_system epss
scoring_elements 0.95703
published_at 2026-04-18T12:55:00Z
9
value 0.21775
scoring_system epss
scoring_elements 0.95722
published_at 2026-04-02T12:55:00Z
10
value 0.21775
scoring_system epss
scoring_elements 0.95765
published_at 2026-04-21T12:55:00Z
11
value 0.21775
scoring_system epss
scoring_elements 0.95766
published_at 2026-04-26T12:55:00Z
12
value 0.21775
scoring_system epss
scoring_elements 0.95713
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0811
3
reference_url https://bugs.gentoo.org/835336
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugs.gentoo.org/835336
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2059475
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=2059475
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/cri-o/cri-o
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/cri-o/cri-o
7
reference_url https://github.com/cri-o/cri-o/security/advisories/GHSA-6x2m-w449-qwx7
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/cri-o/cri-o/security/advisories/GHSA-6x2m-w449-qwx7
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-0811
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-0811
9
reference_url https://www.crowdstrike.com/blog/cr8escape-zero-day-vulnerability-discovered-in-cri-o-container-engine-cve-2022-0811
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.crowdstrike.com/blog/cr8escape-zero-day-vulnerability-discovered-in-cri-o-container-engine-cve-2022-0811
10
reference_url https://access.redhat.com/errata/RHSA-2022:0810
reference_id RHSA-2022:0810
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0810
11
reference_url https://access.redhat.com/errata/RHSA-2022:0860
reference_id RHSA-2022:0860
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0860
12
reference_url https://access.redhat.com/errata/RHSA-2022:0866
reference_id RHSA-2022:0866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0866
13
reference_url https://access.redhat.com/errata/RHSA-2022:0870
reference_id RHSA-2022:0870
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0870
14
reference_url https://access.redhat.com/errata/RHSA-2022:0871
reference_id RHSA-2022:0871
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0871
fixed_packages
aliases CVE-2022-0811, GHSA-6x2m-w449-qwx7
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-11cw-axj8-vkdz
1
url VCID-s6sw-jsfr-xyhv
vulnerability_id VCID-s6sw-jsfr-xyhv
summary
Incorrect Permission Assignment for Critical Resource in CRI-O
An incorrect sysctls validation vulnerability was found in CRI-O 1.18 and earlier. The sysctls from the list of "safe" sysctls specified for the cluster will be applied to the host if an attacker is able to create a pod with a hostIPC and hostNetwork kernel namespace.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0532.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0532.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0532
reference_id
reference_type
scores
0
value 0.00185
scoring_system epss
scoring_elements 0.3992
published_at 2026-04-29T12:55:00Z
1
value 0.00185
scoring_system epss
scoring_elements 0.40001
published_at 2026-04-26T12:55:00Z
2
value 0.00185
scoring_system epss
scoring_elements 0.40015
published_at 2026-04-24T12:55:00Z
3
value 0.00185
scoring_system epss
scoring_elements 0.4019
published_at 2026-04-21T12:55:00Z
4
value 0.00185
scoring_system epss
scoring_elements 0.40309
published_at 2026-04-04T12:55:00Z
5
value 0.00185
scoring_system epss
scoring_elements 0.40284
published_at 2026-04-08T12:55:00Z
6
value 0.00185
scoring_system epss
scoring_elements 0.40231
published_at 2026-04-07T12:55:00Z
7
value 0.00185
scoring_system epss
scoring_elements 0.40266
published_at 2026-04-18T12:55:00Z
8
value 0.00185
scoring_system epss
scoring_elements 0.40298
published_at 2026-04-16T12:55:00Z
9
value 0.00185
scoring_system epss
scoring_elements 0.40251
published_at 2026-04-13T12:55:00Z
10
value 0.00185
scoring_system epss
scoring_elements 0.4027
published_at 2026-04-12T12:55:00Z
11
value 0.00185
scoring_system epss
scoring_elements 0.40308
published_at 2026-04-11T12:55:00Z
12
value 0.00185
scoring_system epss
scoring_elements 0.40133
published_at 2026-04-01T12:55:00Z
13
value 0.00185
scoring_system epss
scoring_elements 0.40296
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0532
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2051730
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=2051730
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/cri-o/cri-o
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/cri-o/cri-o
5
reference_url https://github.com/cri-o/cri-o/pull/5610
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/cri-o/cri-o/pull/5610
6
reference_url https://github.com/cri-o/cri-o/releases/tag/v1.23.1
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/cri-o/cri-o/releases/tag/v1.23.1
7
reference_url https://kubernetes.io/docs/tasks/administer-cluster/sysctl-cluster/#enabling-unsafe-sysctls
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://kubernetes.io/docs/tasks/administer-cluster/sysctl-cluster/#enabling-unsafe-sysctls
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-0532
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-0532
9
reference_url https://access.redhat.com/errata/RHSA-2022:0055
reference_id RHSA-2022:0055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0055
10
reference_url https://access.redhat.com/errata/RHSA-2022:0866
reference_id RHSA-2022:0866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0866
11
reference_url https://access.redhat.com/errata/RHSA-2022:0870
reference_id RHSA-2022:0870
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0870
fixed_packages
aliases CVE-2022-0532, GHSA-jqmc-79gx-7g8p
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s6sw-jsfr-xyhv
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cri-o@1.19.5-3.rhaos4.6.git91f8458%3Farch=el7