First published: Fri Feb 11 2022(Updated: )
A flaw was found in ovn-kubernetes. This flaw allows a system administrator or privileged attacker to create an egress network policy that bypasses existing ingress policies of other pods in a cluster, allowing network traffic to access pods that should not be reachable. This issue results in information disclosure and other attacks on other pods that should not be reachable.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/OCP v 4.10.8 OCP v 4.9.27 OCP v 4.7.47 OCP v | <4.8.36 | 4.8.36 |
Ovn Ovn-kubernetes | <4.7.47 | |
Ovn Ovn-kubernetes | >=4.8.0<4.8.36 | |
Ovn Ovn-kubernetes | >=4.9.0<4.9.27 | |
Ovn Ovn-kubernetes | >=4.10.0<4.10.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0567 is a critical vulnerability found in ovn-kubernetes that allows a system administrator or privileged attacker to create an egress network policy to bypass existing ingress policies, potentially granting unauthorized access to pods.
CVE-2022-0567 impacts the affected software by allowing network traffic to access pods that should not be reachable, bypassing existing ingress policies.
CVE-2022-0567 has a severity rating of 9.1 (critical).
Versions of ovn-kubernetes up to and including 4.8.36, 4.9.27, and 4.10.8 are affected by CVE-2022-0567.
To remediate the CVE-2022-0567 vulnerability, update ovn-kubernetes to a version higher than 4.8.36, 4.9.27, or 4.10.8.