vulnerability
Red Hat OpenShift: CVE-2022-0532: cri-o: pod with access to 'hostIPC' and 'hostNetwork' kernel namespace allows sysctl from the list of safe sysctls to be applied to the host
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:M/Au:S/C:P/I:N/A:P) | Feb 9, 2022 | Mar 11, 2022 | Apr 14, 2025 |
Severity
5
CVSS
(AV:N/AC:M/Au:S/C:P/I:N/A:P)
Published
Feb 9, 2022
Added
Mar 11, 2022
Modified
Apr 14, 2025
Description
An incorrect sysctls validation vulnerability was found in CRI-O 1.18 and earlier. The sysctls from the list of "safe" sysctls specified for the cluster will be applied to the host if an attacker is able to create a pod with a hostIPC and hostNetwork kernel namespace.
Solution
linuxrpm-upgrade-cri-o

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.