CRI-O 1.20.6 Security fix for CVE-0811-2022

Reboot Required
After installing this update it is required that you reboot your system to ensure the changes supplied by this update are applied properly.

This update has been submitted for testing by haircommander.

5 months ago

This update's test gating status has been changed to 'ignored'.

5 months ago
User Icon bynt commented & provided feedback 5 months ago

hello @haircommander, thanks for the update! small typo in the description: CVE-0811-2022 should be CVE-2022-0811

This update has been pushed to testing.

5 months ago
User Icon bynt commented & provided feedback 5 months ago

and the security fix is in 1.20.7 afaics https://github.com/cri-o/cri-o/releases/tag/v1.20.7

This update has been submitted for stable by bodhi.

5 months ago

This update has been pushed to stable.

4 months ago

Please login to add feedback.

Metadata
Type
security
Severity
high
Karma
0
Signed
Content Type
Module
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
7 days
Dates
submitted
5 months ago
in testing
5 months ago
in stable
4 months ago
BZ#2066470 CVE-2022-0811 cri-o:1.20/cri-o: Arbitrary code execution in cri-o via abusing “kernel.core_pattern” kernel parameter [fedora-all]
0
0

Automated Test Results