Количество 16
Количество 16
CVE-2023-25173
containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container ...
CVE-2023-25173
containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container ...
CVE-2023-25173
containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container en
CVE-2023-25173
CVE-2023-25173
containerd is an open source container runtime. A bug was found in con ...
GHSA-hmfx-3pcx-653p
Supplementary groups are not set up properly in github.com/containerd/containerd
BDU:2023-01488
Уязвимость среды выполнения контейнеров Containerd, связанная с недостатками разграничения доступа, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или выполнить произвольный код
SUSE-SU-2023:4124-1
Security update for helm
SUSE-SU-2023:1827-1
Security update for containerd
SUSE-SU-2023:1826-1
Security update for containerd
ROS-20230322-02
Множественные уязвимости containerd
ELSA-2023-6473
ELSA-2023-6473: buildah security update (MODERATE)
ELSA-2023-6474
ELSA-2023-6474: podman security, bug fix, and enhancement update (MODERATE)
ROS-20240418-06
Множественные уязвимости buildah
RLSA-2023:6939
Moderate: container-tools:rhel8 security and bug fix update
ELSA-2023-6939
ELSA-2023-6939: container-tools:ol8 security and bug fix update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-25173 containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container ... | CVSS3: 5.3 | 0% Низкий | почти 3 года назад | |
CVE-2023-25173 containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container ... | CVSS3: 7.3 | 0% Низкий | почти 3 года назад | |
CVE-2023-25173 containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container en | CVSS3: 5.3 | 0% Низкий | почти 3 года назад | |
CVSS3: 7.8 | 0% Низкий | почти 3 года назад | ||
CVE-2023-25173 containerd is an open source container runtime. A bug was found in con ... | CVSS3: 5.3 | 0% Низкий | почти 3 года назад | |
GHSA-hmfx-3pcx-653p Supplementary groups are not set up properly in github.com/containerd/containerd | CVSS3: 5.3 | 0% Низкий | почти 3 года назад | |
BDU:2023-01488 Уязвимость среды выполнения контейнеров Containerd, связанная с недостатками разграничения доступа, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или выполнить произвольный код | CVSS3: 7.8 | 0% Низкий | почти 3 года назад | |
SUSE-SU-2023:4124-1 Security update for helm | около 2 лет назад | |||
SUSE-SU-2023:1827-1 Security update for containerd | больше 2 лет назад | |||
SUSE-SU-2023:1826-1 Security update for containerd | больше 2 лет назад | |||
ROS-20230322-02 Множественные уязвимости containerd | CVSS3: 7.8 | больше 2 лет назад | ||
ELSA-2023-6473 ELSA-2023-6473: buildah security update (MODERATE) | около 2 лет назад | |||
ELSA-2023-6474 ELSA-2023-6474: podman security, bug fix, and enhancement update (MODERATE) | около 2 лет назад | |||
ROS-20240418-06 Множественные уязвимости buildah | CVSS3: 9.8 | больше 1 года назад | ||
RLSA-2023:6939 Moderate: container-tools:rhel8 security and bug fix update | 16 дней назад | |||
ELSA-2023-6939 ELSA-2023-6939: container-tools:ol8 security and bug fix update (MODERATE) | около 2 лет назад |
Уязвимостей на страницу