Описание
A flaw was found in cifs-utils in versions before 6.13. A user when mounting a krb5 CIFS file system from within a container can use Kerberos credentials of the host. The highest threat from this vulnerability is to data confidentiality and integrity.
Ссылки
- Issue TrackingThird Party Advisory
- Issue TrackingPatchVendor Advisory
- Issue TrackingThird Party Advisory
- Issue TrackingPatchVendor Advisory
Уязвимые конфигурации
Одно из
Одно из
EPSS
6.1 Medium
CVSS3
4.9 Medium
CVSS2
Дефекты
Связанные уязвимости
A flaw was found in cifs-utils in versions before 6.13. A user when mounting a krb5 CIFS file system from within a container can use Kerberos credentials of the host. The highest threat from this vulnerability is to data confidentiality and integrity.
A flaw was found in cifs-utils in versions before 6.13. A user when mounting a krb5 CIFS file system from within a container can use Kerberos credentials of the host. The highest threat from this vulnerability is to data confidentiality and integrity.
A flaw was found in cifs-utils in versions before 6.13. A user when mo ...
EPSS
6.1 Medium
CVSS3
4.9 Medium
CVSS2