First published: Thu Jan 27 2022(Updated: )
An incorrect sysctls validation vulnerability was found in CRI-O 1.18 and earlier. The sysctls from the list of "safe" sysctls specified for the cluster will be applied to the host if an attacker is able to create a pod with a hostIPC and hostNetwork kernel namespace.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/cri-o | <0:1.23.0-92.rhaos4.10.gitdaab4d1.el7 | 0:1.23.0-92.rhaos4.10.gitdaab4d1.el7 |
redhat/cri-o | <0:1.19.5-3.rhaos4.6.git91f8458.el8 | 0:1.19.5-3.rhaos4.6.git91f8458.el8 |
redhat/cri-o | <0:1.20.6-11.rhaos4.7.git76ea3d0.el8 | 0:1.20.6-11.rhaos4.7.git76ea3d0.el8 |
redhat/cri-o | <0:1.21.5-2.rhaos4.8.gitaf64931.el8 | 0:1.21.5-2.rhaos4.8.gitaf64931.el8 |
redhat/cri-o | <0:1.22.2-2.rhaos4.9.gitb030be8.el7 | 0:1.22.2-2.rhaos4.9.gitb030be8.el7 |
Kubernetes CRI-O | <=1.18 | |
Redhat Openshift Container Platform | =4.0 | |
redhat/cri-o | <1.23.1 | 1.23.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-0532 is an incorrect sysctls validation vulnerability found in CRI-O.
CVE-2022-0532 allows an attacker to apply sysctls from the list of "safe" sysctls to the host if they can create a pod with a hostIPC and hostNetwork kernel namespace.
CVE-2022-0532 has a severity level of medium.
CRI-O versions 1.18 and earlier are affected by CVE-2022-0532.
To fix CVE-2022-0532, upgrade to CRI-O version 1.23.1 or later.