CVE-2022-0532Incorrect Permission Assignment in Cri-o Cri-o

Severity
4.2MEDIUMNVD
EPSS
0.2%
top 59.70%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 9
Latest updateAug 21

Description

An incorrect sysctls validation vulnerability was found in CRI-O 1.18 and earlier. The sysctls from the list of "safe" sysctls specified for the cluster will be applied to the host if an attacker is able to create a pod with a hostIPC and hostNetwork kernel namespace.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:LExploitability: 1.6 | Impact: 2.5

Affected Packages3 packages

CVEListV5kubernetes/cri-o1.18

Also affects: Openshift Container Platform 4.0

Patches

🔴Vulnerability Details

4
OSV
Incorrect Permission Assignment for Critical Resource in CRI-O in github.com/cri-o/cri-o2024-08-21
GHSA
Incorrect Permission Assignment for Critical Resource in CRI-O2022-02-11
OSV
Incorrect Permission Assignment for Critical Resource in CRI-O2022-02-11
CVEList
CVE-2022-0532: An incorrect sysctls validation vulnerability was found in CRI-O 12022-02-09

📋Vendor Advisories

1
Red Hat
cri-o: pod with access to 'hostIPC' and 'hostNetwork' kernel namespace allows sysctl from the list of safe sysctls to be applied to the host2022-01-27
CVE-2022-0532 — Incorrect Permission Assignment | cvebase