Lucene search

K
vulnrichmentRedhatVULNRICHMENT:CVE-2022-3466
HistorySep 15, 2023 - 1:18 p.m.

CVE-2022-3466 Cri-o: security regression of cve-2022-27652

2023-09-1513:18:27
CWE-276
redhat
github.com
6
cve-2022-3466
cri-o
security regression fix
red hat openshift container platform 4.9.48
4.10.31
4.11.6
rhba-2022:6316
rhba-2022:6257
rhba-2022:6658
inheritable file capabilities
execve(2)

CVSS3

4.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L

AI Score

6.8

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

The version of cri-o as released for Red Hat OpenShift Container Platform 4.9.48, 4.10.31, and 4.11.6 via RHBA-2022:6316, RHBA-2022:6257, and RHBA-2022:6658, respectively, included an incorrect version of cri-o missing the fix for CVE-2022-27652, which was previously fixed in OCP 4.9.41 and 4.10.12 via RHBA-2022:5433 and RHSA-2022:1600. This issue could allow an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs. For more details, see https://access.redhat.com/security/cve/CVE-2022-27652.

CNA Affected

[
  {
    "cpes": [
      "cpe:/a:redhat:openshift:4.12::el8",
      "cpe:/a:redhat:openshift:4.12::el9",
      "cpe:/a:redhat:openshift_ironic:4.12::el9"
    ],
    "vendor": "Red Hat",
    "product": "Red Hat OpenShift Container Platform 4.12",
    "versions": [
      {
        "status": "unaffected",
        "version": "0:1.25.1-5.rhaos4.12.git6005903.el9",
        "lessThan": "*",
        "versionType": "rpm"
      }
    ],
    "packageName": "cri-o",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "defaultStatus": "affected"
  },
  {
    "cpes": [
      "cpe:/a:redhat:openshift:3.11"
    ],
    "vendor": "Red Hat",
    "product": "Red Hat OpenShift Container Platform 3.11",
    "packageName": "cri-o",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "defaultStatus": "unknown"
  }
]

CVSS3

4.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L

AI Score

6.8

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial