Логотип exploitDog
bind:"CVE-2022-29162" OR bind:"CVE-2022-27191" OR bind:"CVE-2022-1708"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2022-29162" OR bind:"CVE-2022-27191" OR bind:"CVE-2022-1708"

Количество 54

Количество 54

rocky логотип

RLSA-2022:7469

почти 3 года назад

Moderate: container-tools:4.0 security and bug fix update

EPSS: Низкий
oracle-oval логотип

ELSA-2022-7469

почти 3 года назад

ELSA-2022-7469: container-tools:4.0 security and bug fix update (MODERATE)

EPSS: Низкий
rocky логотип

RLSA-2022:7457

почти 3 года назад

Moderate: container-tools:rhel8 security, bug fix, and enhancement update

EPSS: Низкий
oracle-oval логотип

ELSA-2022-7457

почти 3 года назад

ELSA-2022-7457: container-tools:ol8 security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2022-29162

больше 3 лет назад

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. A bug was found in runc prior to version 1.1.2 where `runc exec --cap` created processes with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2). This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set. This bug has been fixed in runc 1.1.2. This fix changes `runc exec --cap` behavior such that the additional capabilities granted to the process being executed (as specified via `--cap` arguments) do not include inheritable capabilities. In addition, `runc spec` is changed to not set any inheritable capabilities in the created example OCI spec (`config.json`) file.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2022-29162

больше 3 лет назад

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. A bug was found in runc prior to version 1.1.2 where `runc exec --cap` created processes with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2). This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set. This bug has been fixed in runc 1.1.2. This fix changes `runc exec --cap` behavior such that the additional capabilities granted to the process being executed (as specified via `--cap` arguments) do not include inheritable capabilities. In addition, `runc spec` is changed to not set any inheritable capabilities in the created example OCI spec (`config.json`) file.

CVSS3: 5.6
EPSS: Низкий
nvd логотип

CVE-2022-29162

больше 3 лет назад

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. A bug was found in runc prior to version 1.1.2 where `runc exec --cap` created processes with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2). This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set. This bug has been fixed in runc 1.1.2. This fix changes `runc exec --cap` behavior such that the additional capabilities granted to the process being executed (as specified via `--cap` arguments) do not include inheritable capabilities. In addition, `runc spec` is changed to not set any inheritable capabilities in the created example OCI spec (`config.json`) file.

CVSS3: 5.9
EPSS: Низкий
msrc логотип

CVE-2022-29162

больше 3 лет назад

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2022-29162

больше 3 лет назад

runc is a CLI tool for spawning and running containers on Linux accord ...

CVSS3: 5.9
EPSS: Низкий
rocky логотип

RLSA-2022:8090

почти 3 года назад

Low: runc security update

EPSS: Низкий
github логотип

GHSA-f3fp-gc8g-vw66

больше 3 лет назад

Default inheritable capabilities for linux container should be empty

CVSS3: 5.9
EPSS: Низкий
oracle-oval логотип

ELSA-2022-8090

почти 3 года назад

ELSA-2022-8090: runc security update (LOW)

EPSS: Низкий
fstec логотип

BDU:2022-05793

больше 3 лет назад

Уязвимость команды 'runc exec --cap' инструмента для запуска изолированных контейнеров Runc, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2341-1

больше 3 лет назад

Security update for containerd, docker and runc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2165-1

больше 3 лет назад

Security update for containerd

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3333-1

около 3 лет назад

Security update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3321-1

около 3 лет назад

Security update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container

EPSS: Низкий
ubuntu логотип

CVE-2022-1708

больше 3 лет назад

A vulnerability was found in CRI-O that causes memory or disk space exhaustion on the node for anyone with access to the Kube API. The ExecSync request runs commands in a container and logs the output of the command. This output is then read by CRI-O after command execution, and it is read in a manner where the entire file corresponding to the output of the command is read in. Thus, if the output of the command is large it is possible to exhaust the memory or the disk space of the node when CRI-O reads the output of the command. The highest threat from this vulnerability is system availability.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2022-1708

больше 3 лет назад

A vulnerability was found in CRI-O that causes memory or disk space exhaustion on the node for anyone with access to the Kube API. The ExecSync request runs commands in a container and logs the output of the command. This output is then read by CRI-O after command execution, and it is read in a manner where the entire file corresponding to the output of the command is read in. Thus, if the output of the command is large it is possible to exhaust the memory or the disk space of the node when CRI-O reads the output of the command. The highest threat from this vulnerability is system availability.

CVSS3: 6.8
EPSS: Низкий
nvd логотип

CVE-2022-1708

больше 3 лет назад

A vulnerability was found in CRI-O that causes memory or disk space exhaustion on the node for anyone with access to the Kube API. The ExecSync request runs commands in a container and logs the output of the command. This output is then read by CRI-O after command execution, and it is read in a manner where the entire file corresponding to the output of the command is read in. Thus, if the output of the command is large it is possible to exhaust the memory or the disk space of the node when CRI-O reads the output of the command. The highest threat from this vulnerability is system availability.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2022:7469

Moderate: container-tools:4.0 security and bug fix update

почти 3 года назад
oracle-oval логотип
ELSA-2022-7469

ELSA-2022-7469: container-tools:4.0 security and bug fix update (MODERATE)

почти 3 года назад
rocky логотип
RLSA-2022:7457

Moderate: container-tools:rhel8 security, bug fix, and enhancement update

почти 3 года назад
oracle-oval логотип
ELSA-2022-7457

ELSA-2022-7457: container-tools:ol8 security, bug fix, and enhancement update (MODERATE)

почти 3 года назад
ubuntu логотип
CVE-2022-29162

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. A bug was found in runc prior to version 1.1.2 where `runc exec --cap` created processes with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2). This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set. This bug has been fixed in runc 1.1.2. This fix changes `runc exec --cap` behavior such that the additional capabilities granted to the process being executed (as specified via `--cap` arguments) do not include inheritable capabilities. In addition, `runc spec` is changed to not set any inheritable capabilities in the created example OCI spec (`config.json`) file.

CVSS3: 5.9
0%
Низкий
больше 3 лет назад
redhat логотип
CVE-2022-29162

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. A bug was found in runc prior to version 1.1.2 where `runc exec --cap` created processes with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2). This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set. This bug has been fixed in runc 1.1.2. This fix changes `runc exec --cap` behavior such that the additional capabilities granted to the process being executed (as specified via `--cap` arguments) do not include inheritable capabilities. In addition, `runc spec` is changed to not set any inheritable capabilities in the created example OCI spec (`config.json`) file.

CVSS3: 5.6
0%
Низкий
больше 3 лет назад
nvd логотип
CVE-2022-29162

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. A bug was found in runc prior to version 1.1.2 where `runc exec --cap` created processes with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2). This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set. This bug has been fixed in runc 1.1.2. This fix changes `runc exec --cap` behavior such that the additional capabilities granted to the process being executed (as specified via `--cap` arguments) do not include inheritable capabilities. In addition, `runc spec` is changed to not set any inheritable capabilities in the created example OCI spec (`config.json`) file.

CVSS3: 5.9
0%
Низкий
больше 3 лет назад
msrc логотип
CVSS3: 7.8
0%
Низкий
больше 3 лет назад
debian логотип
CVE-2022-29162

runc is a CLI tool for spawning and running containers on Linux accord ...

CVSS3: 5.9
0%
Низкий
больше 3 лет назад
rocky логотип
RLSA-2022:8090

Low: runc security update

0%
Низкий
почти 3 года назад
github логотип
GHSA-f3fp-gc8g-vw66

Default inheritable capabilities for linux container should be empty

CVSS3: 5.9
0%
Низкий
больше 3 лет назад
oracle-oval логотип
ELSA-2022-8090

ELSA-2022-8090: runc security update (LOW)

почти 3 года назад
fstec логотип
BDU:2022-05793

Уязвимость команды 'runc exec --cap' инструмента для запуска изолированных контейнеров Runc, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 7.8
0%
Низкий
больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:2341-1

Security update for containerd, docker and runc

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:2165-1

Security update for containerd

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:3333-1

Security update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container

около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:3321-1

Security update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container

около 3 лет назад
ubuntu логотип
CVE-2022-1708

A vulnerability was found in CRI-O that causes memory or disk space exhaustion on the node for anyone with access to the Kube API. The ExecSync request runs commands in a container and logs the output of the command. This output is then read by CRI-O after command execution, and it is read in a manner where the entire file corresponding to the output of the command is read in. Thus, if the output of the command is large it is possible to exhaust the memory or the disk space of the node when CRI-O reads the output of the command. The highest threat from this vulnerability is system availability.

CVSS3: 7.5
1%
Низкий
больше 3 лет назад
redhat логотип
CVE-2022-1708

A vulnerability was found in CRI-O that causes memory or disk space exhaustion on the node for anyone with access to the Kube API. The ExecSync request runs commands in a container and logs the output of the command. This output is then read by CRI-O after command execution, and it is read in a manner where the entire file corresponding to the output of the command is read in. Thus, if the output of the command is large it is possible to exhaust the memory or the disk space of the node when CRI-O reads the output of the command. The highest threat from this vulnerability is system availability.

CVSS3: 6.8
1%
Низкий
больше 3 лет назад
nvd логотип
CVE-2022-1708

A vulnerability was found in CRI-O that causes memory or disk space exhaustion on the node for anyone with access to the Kube API. The ExecSync request runs commands in a container and logs the output of the command. This output is then read by CRI-O after command execution, and it is read in a manner where the entire file corresponding to the output of the command is read in. Thus, if the output of the command is large it is possible to exhaust the memory or the disk space of the node when CRI-O reads the output of the command. The highest threat from this vulnerability is system availability.

CVSS3: 7.5
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу