CVE-2022-0532
Summary
| CVE | CVE-2022-0532 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-02-09 23:15:00 UTC |
| Updated | 2022-02-22 20:56:00 UTC |
| Description | An incorrect sysctls validation vulnerability was found in CRI-O 1.18 and earlier. The sysctls from the list of "safe" sysctls specified for the cluster will be applied to the host if an attacker is able to create a pod with a hostIPC and hostNetwork kernel namespace. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Using sysctls in a Kubernetes Cluster | Kubernetes |
MISC |
kubernetes.io |
|
| 2051730 – (CVE-2022-0532) CVE-2022-0532 cri-o: pod with access to 'hostIPC' and 'hostNetwork' kernel namespace allows sysctl from the list of safe sysctls to be applied to the host |
MISC |
bugzilla.redhat.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 240138 Red Hat OpenShift Container Platform 4.1 Security Update (RHSA-2022:0055)
- 770138 Red Hat OpenShift Container Platform 4.1 Security Update (RHSA-2022:0055)