Lookup for vulnerable packages by Package URL.

Purlpkg:golang/github.com/cri-o/cri-o@1.20.6
Typegolang
Namespacegithub.com/cri-o
Namecri-o
Version1.20.6
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.20.7
Latest_non_vulnerable_version1.31.3
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-w3mr-v5ew-vfcj
vulnerability_id VCID-w3mr-v5ew-vfcj
summary
Sysctls applied to containers with host IPC or host network namespaces can affect the host
### Impact
Before setting the sysctls for a pod, the pods namespaces must be unshared (created). However, in cases where the pod is using a host network or IPC namespace, a bug in CRI-O caused the namespace creating tool [pinns](https://github.com/cri-o/cri-o/tree/main/pinns/) to configure the sysctls of the host. This allows a malicious user to set sysctls on the host, assuming they have access to hostNetwork and hostIPC.

Any CRI-O cluster after CRI-O 1.18 that drops the infra container
1.22 and 1.23 clusters drop infra container by default, and are thus vulnerable by default.

### Patches
CRI-O versions 1.24.0, 1.23.1, 1.22.2, 1.21.5, 1.20.6, 1.19.5 all have the patches.

### Workarounds
Users can set `manage_ns_lifecycle` to false, which causes the sysctls to be configured by the OCI runtime, which typically filter these cases. This option is available in 1.20 and 1.19. Newer versions don't have this option.
An admission webhook could also be created to deny pods that use host IPC or network namespaces and also attempt to configure sysctls related to that namespace.

### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the CRI-O repo](http://github.com/cri-o/cri-o/issues)
* To make a report, email your vulnerability to the private
[cncf-crio-security@lists.cncf.io](mailto:cncf-crio-security@lists.cncf.io) list
with the security details and the details expected for [all CRI-O bug
reports](https://github.com/cri-o/cri-o/blob/main/.github/ISSUE_TEMPLATE/bug-report.yml).
references
0
reference_url https://github.com/cri-o/cri-o
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/cri-o/cri-o
1
reference_url https://github.com/cri-o/cri-o/security/advisories/GHSA-w2j5-3rcx-vx7x
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/cri-o/cri-o/security/advisories/GHSA-w2j5-3rcx-vx7x
fixed_packages
0
url pkg:golang/github.com/cri-o/cri-o@1.19.5
purl pkg:golang/github.com/cri-o/cri-o@1.19.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/cri-o/cri-o@1.19.5
1
url pkg:golang/github.com/cri-o/cri-o@1.20.6
purl pkg:golang/github.com/cri-o/cri-o@1.20.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/cri-o/cri-o@1.20.6
2
url pkg:golang/github.com/cri-o/cri-o@1.21.5
purl pkg:golang/github.com/cri-o/cri-o@1.21.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/cri-o/cri-o@1.21.5
3
url pkg:golang/github.com/cri-o/cri-o@1.22.2
purl pkg:golang/github.com/cri-o/cri-o@1.22.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/cri-o/cri-o@1.22.2
4
url pkg:golang/github.com/cri-o/cri-o@1.23.1
purl pkg:golang/github.com/cri-o/cri-o@1.23.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/cri-o/cri-o@1.23.1
aliases GHSA-w2j5-3rcx-vx7x
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w3mr-v5ew-vfcj
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:golang/github.com/cri-o/cri-o@1.20.6