CVE-2022-0532
Description
An incorrect sysctls validation vulnerability was found in CRI-O 1.18 and earlier. The sysctls from the list of "safe" sysctls specified for the cluster will be applied to the host if an attacker is able to create a pod with a hostIPC and hostNetwork kernel namespace.
References
CvssV3 impact
BaseSeverity | MEDIUM |
ConfidentialityImpact | LOW |
AttackComplexity | HIGH |
Scope | UNCHANGED |
AttackVector | NETWORK |
AvailabilityImpact | LOW |
IntegrityImpact | NONE |
PrivilegesRequired | LOW |
BaseScore | 4.2 |
VectorString | CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L |
Version | 3.1 |
UserInteraction | NONE |
CvssV2 impact
AccessComplexity | MEDIUM |
ConfidentialityImpact | PARTIAL |
AvailabilityImpact | PARTIAL |
IntegrityImpact | NONE |
BaseScore | 4.900000095367432 |
VectorString | AV:N/AC:M/Au:S/C:P/I:N/A:P |
Version | 2.0 |
AccessVector | NETWORK |
Authentication | SINGLE |