Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-0532

Опубликовано: 09 фев. 2022
Источник: debian
EPSS Низкий

Описание

An incorrect sysctls validation vulnerability was found in CRI-O 1.18 and earlier. The sysctls from the list of "safe" sysctls specified for the cluster will be applied to the host if an attacker is able to create a pod with a hostIPC and hostNetwork kernel namespace.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
cri-oitppackage

EPSS

Процентиль: 24%
0.00079
Низкий

Связанные уязвимости

CVSS3: 4.2
ubuntu
почти 4 года назад

An incorrect sysctls validation vulnerability was found in CRI-O 1.18 and earlier. The sysctls from the list of "safe" sysctls specified for the cluster will be applied to the host if an attacker is able to create a pod with a hostIPC and hostNetwork kernel namespace.

CVSS3: 4.2
redhat
около 4 лет назад

An incorrect sysctls validation vulnerability was found in CRI-O 1.18 and earlier. The sysctls from the list of "safe" sysctls specified for the cluster will be applied to the host if an attacker is able to create a pod with a hostIPC and hostNetwork kernel namespace.

CVSS3: 4.2
nvd
почти 4 года назад

An incorrect sysctls validation vulnerability was found in CRI-O 1.18 and earlier. The sysctls from the list of "safe" sysctls specified for the cluster will be applied to the host if an attacker is able to create a pod with a hostIPC and hostNetwork kernel namespace.

CVSS3: 4.2
github
почти 4 года назад

Incorrect Permission Assignment for Critical Resource in CRI-O

EPSS

Процентиль: 24%
0.00079
Низкий