CVE-2022-4318

A vulnerability was found in cri-o. This issue allows the addition of arbitrary lines into /etc/passwd by use of a specially crafted environment variable.
Configurations

Configuration 1 (hide)

cpe:2.3:a:kubernetes:cri-o:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:a:redhat:openshift_container_platform_for_arm64:4.12:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.12:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_power:4.12:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_ibm_z_systems:4.12:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:a:redhat:openshift_container_platform_for_arm64:4.12:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.12:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_power:4.12:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_ibm_z_systems:4.12:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
OR cpe:2.3:a:redhat:openshift_container_platform_for_arm64:4.11:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.11:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_power:4.11:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_ibm_z_systems:4.11:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 07:35

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2023:1033 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2023:1033 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2023:1503 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2023:1503 - Third Party Advisory
References () https://access.redhat.com/security/cve/CVE-2022-4318 - Third Party Advisory () https://access.redhat.com/security/cve/CVE-2022-4318 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2152703 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=2152703 - Issue Tracking, Third Party Advisory

03 May 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-25 20:15

Updated : 2024-11-21 07:35


NVD link : CVE-2022-4318

Mitre link : CVE-2022-4318

CVE.ORG link : CVE-2022-4318


JSON object : View

Products Affected

redhat

  • openshift_container_platform_ibm_z_systems
  • openshift_container_platform_for_arm64
  • openshift_container_platform_for_power
  • openshift_container_platform_for_linuxone
  • enterprise_linux

fedoraproject

  • fedora
  • extra_packages_for_enterprise_linux

kubernetes

  • cri-o
CWE
CWE-538

Insertion of Sensitive Information into Externally-Accessible File or Directory

CWE-913

Improper Control of Dynamically-Managed Code Resources