First published: Mon Dec 12 2022(Updated: )
### Impact It is possible to craft an environment variable with newlines to add entries to a container's /etc/passwd. It is possible to circumvent admission validation of username/UID by adding such an entry. Note: because the pod author is in control of the container's /etc/passwd, this is not considered a new risk factor. However, this advisory is being opened for transparency and as a way of tracking fixes. ### Patches 1.26.0 will have the fix. More patches will be posted as they're available. ### Workarounds Additional security controls like SELinux should prevent any damage a container is able to do with root on the host. Using SELinux is recommended because this class of attack is already possible by manually editing the container's /etc/passwd ### References
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/cri-o | <0:1.24.4-10.rhaos4.11.git1ed5ac5.el8 | 0:1.24.4-10.rhaos4.11.git1ed5ac5.el8 |
redhat/cri-o | <0:1.25.2-10.rhaos4.12.git0a083f9.el8 | 0:1.25.2-10.rhaos4.12.git0a083f9.el8 |
go/github.com/cri-o/cri-o | <1.26.0 | 1.26.0 |
CRI-O | ||
All of | ||
Any of | ||
Red Hat OpenShift Container Platform | =4.12 | |
Red Hat OpenShift Container Platform | =4.12 | |
Red Hat OpenShift Container Platform for Power | =4.12 | |
Red Hat OpenShift Container Platform | =4.12 | |
Red Hat Enterprise Linux | =8.0 | |
All of | ||
Any of | ||
Red Hat OpenShift Container Platform | =4.12 | |
Red Hat OpenShift Container Platform | =4.12 | |
Red Hat OpenShift Container Platform for Power | =4.12 | |
Red Hat OpenShift Container Platform | =4.12 | |
Red Hat Enterprise Linux | =9.0 | |
Fedora EPEL | =8.0 | |
Fedora | =36 | |
Fedora | =37 | |
All of | ||
Any of | ||
Red Hat OpenShift Container Platform | =4.11 | |
Red Hat OpenShift Container Platform | =4.11 | |
Red Hat OpenShift Container Platform for Power | =4.11 | |
Red Hat OpenShift Container Platform | =4.11 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat OpenShift Container Platform | =4.12 | |
Red Hat OpenShift Container Platform | =4.12 | |
Red Hat OpenShift Container Platform for Power | =4.12 | |
Red Hat OpenShift Container Platform | =4.12 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
Red Hat OpenShift Container Platform | =4.11 | |
Red Hat OpenShift Container Platform | =4.11 | |
Red Hat OpenShift Container Platform for Power | =4.11 | |
Red Hat OpenShift Container Platform | =4.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4318 is a vulnerability found in cri-o that allows the addition of arbitrary lines into /etc/passwd.
The impact of CVE-2022-4318 is the ability to add entries to a container's /etc/passwd by crafting an environment variable with newlines.
Admission validation of username/UID can be circumvented in CVE-2022-4318 by adding an entry with newlines to the container's /etc/passwd.
The software versions affected by CVE-2022-4318 include cri-o 1.26.0, Kubernetes Cri-o, Redhat Openshift Container Platform, Redhat Enterprise Linux, Fedoraproject Extra Packages For Enterprise Linux, and Fedoraproject Fedora.
CVE-2022-4318 has a severity rating of 7.8 (high).