{
  "threat_severity" : "Important",
  "public_date" : "2022-03-23T00:00:00Z",
  "bugzilla" : {
    "description" : "ovn-kubernetes: Ingress network policy can be overruled by egress network policy on another pod",
    "id" : "2053326",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2053326"
  },
  "cvss3" : {
    "cvss3_base_score" : "8.2",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L",
    "status" : "verified"
  },
  "cwe" : "CWE-179",
  "details" : [ "A flaw was found in ovn-kubernetes. This flaw allows a system administrator or privileged attacker to create an egress network policy that bypasses existing ingress policies of other pods in a cluster, allowing network traffic to access pods that should not be reachable. This issue results in information disclosure and other attacks on other pods that should not be reachable.", "A flaw was found in ovn-kubernetes. This flaw allows a system administrator or privileged attacker to create an egress network policy that bypasses existing ingress policies of other pods in a cluster, allowing network traffic to access pods that should not be reachable. This issue results in information disclosure and other attacks on other pods that should not be reachable." ],
  "acknowledgement" : "Red Hat would like to thank Logius Standaard Platform for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat OpenShift Container Platform 4.10",
    "release_date" : "2022-04-08T00:00:00Z",
    "advisory" : "RHSA-2022:1162",
    "cpe" : "cpe:/a:redhat:openshift:4.10::el8",
    "package" : "openshift4/ose-ovn-kubernetes:v4.10.0-202203311829.p0.gc580607.assembly.stream"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.7",
    "release_date" : "2022-04-11T00:00:00Z",
    "advisory" : "RHSA-2022:1166",
    "cpe" : "cpe:/a:redhat:openshift:4.7::el8",
    "package" : "openshift4/ose-ovn-kubernetes:v4.7.0-202203311831.p0.g385bc8f.assembly.stream"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.8",
    "release_date" : "2022-04-11T00:00:00Z",
    "advisory" : "RHSA-2022:1154",
    "cpe" : "cpe:/a:redhat:openshift:4.8::el8",
    "package" : "openshift4/ose-ovn-kubernetes:v4.8.0-202203311830.p0.gaa2c3f4.assembly.stream"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.9",
    "release_date" : "2022-04-08T00:00:00Z",
    "advisory" : "RHSA-2022:1158",
    "cpe" : "cpe:/a:redhat:openshift:4.9::el8",
    "package" : "openshift4/ose-ovn-kubernetes:v4.9.0-202203311521.p0.ga6eec84.assembly.stream"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat OpenShift Container Platform 3.11",
    "fix_state" : "Not affected",
    "package_name" : "openshift3/ose-ovn-kubernetes",
    "cpe" : "cpe:/a:redhat:openshift:3.11"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 3.11",
    "fix_state" : "Not affected",
    "package_name" : "openvswitch-ovn-kubernetes",
    "cpe" : "cpe:/a:redhat:openshift:3.11"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2022-0567\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-0567" ],
  "name" : "CVE-2022-0567",
  "csaw" : false
}