CRI-O container engine bug allows Kubernetes container escape

By

Provides cross-container root access.

Kubernetes users running the CRI-O container engine need to patch against a newly-discovered container escape vulnerability.

CRI-O container engine bug allows Kubernetes container escape

Discovered by Crowdstrike and subbed “cr8escape”, the CRI-O bug (CVE-2022-0811) allows a malicious actor to power up a container on shared infrastructure, and from their container launch attacks against other containers, including malicious code execution, data exfiltration, and lateral movement across pods.

As noted in the Crowdstrike advisory, the attack vector is via abusing the kernel.core_pattern kernel parameter to escape their container.

The advisory cited OpenShift 4 and the Oracle Container Engine for Kubernetes as platforms that may be affected by the CRI-O bug, and there are others. A complete list of CRI-O adopters is here.

The flaw was introduced in Version 1.19 of CRI-O, and is patched in versions 1.19.6, 1.20.7, 1.21.6, 1.22.3, 1.23.2, 1.24.0. Patched versions are here.

Crowdstrike adds that the pinns_path configuration parameter can be set “to point to a pinns wrapper that strips the ‘-s’ option”, preventing pods from updating any kernel parameters.

Finally, Crowdstrike’s researchers note: “Kubernetes is not necessary to invoke CVE-2022-8011. An attacker on a machine with CRI-O installed can use it to set kernel parameters all by itself”.

 

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

Victoria's first government tech chief steps down

Victoria's first government tech chief steps down

SA Water plans 'once-in-a-generation' core technology uplift

SA Water plans 'once-in-a-generation' core technology uplift

NSW Police to embark on $126m IT overhaul

NSW Police to embark on $126m IT overhaul

WhatsApp banned on US House of Representatives devices

WhatsApp banned on US House of Representatives devices

Log In

  |  Forgot your password?