Логотип exploitDog
bind:"CVE-2023-28642" OR bind:"CVE-2023-25809" OR bind:"CVE-2023-27561"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-28642" OR bind:"CVE-2023-25809" OR bind:"CVE-2023-27561"

Количество 29

Количество 29

suse-cvrf логотип

SUSE-SU-2023:2003-1

около 2 лет назад

Security update for runc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1726-1

около 2 лет назад

Security update for runc

EPSS: Низкий
oracle-oval логотип

ELSA-2023-12579

почти 2 года назад

ELSA-2023-12579: aardvark-dns security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-12578

почти 2 года назад

ELSA-2023-12578: buildah security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-6380

больше 1 года назад

ELSA-2023-6380: runc security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-6938

больше 1 года назад

ELSA-2023-6938: container-tools:4.0 security and bug fix update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-6939

больше 1 года назад

ELSA-2023-6939: container-tools:ol8 security and bug fix update (MODERATE)

EPSS: Низкий
redos логотип

ROS-20231031-01

больше 1 года назад

Множественные уязвимости runc

CVSS3: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2023-28642

около 2 лет назад

runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked `/proc`. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.

CVSS3: 6.1
EPSS: Низкий
redhat логотип

CVE-2023-28642

около 2 лет назад

runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked `/proc`. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2023-28642

около 2 лет назад

runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked `/proc`. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.

CVSS3: 6.1
EPSS: Низкий
msrc логотип

CVE-2023-28642

около 2 лет назад

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2023-28642

около 2 лет назад

runc is a CLI tool for spawning and running containers according to th ...

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-g2j6-57v7-gm8c

около 2 лет назад

runc AppArmor bypass with symlinked /proc

CVSS3: 6.1
EPSS: Низкий
fstec логотип

BDU:2023-03869

около 2 лет назад

Уязвимость инструмента для запуска изолированных контейнеров Runc, связанная с неверным определением символических ссылок перед доступом к файлу, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2023-27561

больше 2 лет назад

runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.

CVSS3: 7
EPSS: Низкий
redhat логотип

CVE-2023-27561

больше 2 лет назад

runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2023-27561

больше 2 лет назад

runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.

CVSS3: 7
EPSS: Низкий
msrc логотип

CVE-2023-27561

больше 2 лет назад

CVSS3: 7
EPSS: Низкий
debian логотип

CVE-2023-27561

больше 2 лет назад

runc through 1.1.4 has Incorrect Access Control leading to Escalation ...

CVSS3: 7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2023:2003-1

Security update for runc

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1726-1

Security update for runc

около 2 лет назад
oracle-oval логотип
ELSA-2023-12579

ELSA-2023-12579: aardvark-dns security update (IMPORTANT)

почти 2 года назад
oracle-oval логотип
ELSA-2023-12578

ELSA-2023-12578: buildah security update (IMPORTANT)

почти 2 года назад
oracle-oval логотип
ELSA-2023-6380

ELSA-2023-6380: runc security update (MODERATE)

больше 1 года назад
oracle-oval логотип
ELSA-2023-6938

ELSA-2023-6938: container-tools:4.0 security and bug fix update (MODERATE)

больше 1 года назад
oracle-oval логотип
ELSA-2023-6939

ELSA-2023-6939: container-tools:ol8 security and bug fix update (MODERATE)

больше 1 года назад
redos логотип
ROS-20231031-01

Множественные уязвимости runc

CVSS3: 7.8
больше 1 года назад
ubuntu логотип
CVE-2023-28642

runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked `/proc`. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.

CVSS3: 6.1
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-28642

runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked `/proc`. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.

CVSS3: 7.8
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-28642

runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked `/proc`. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.

CVSS3: 6.1
0%
Низкий
около 2 лет назад
msrc логотип
CVSS3: 7.8
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-28642

runc is a CLI tool for spawning and running containers according to th ...

CVSS3: 6.1
0%
Низкий
около 2 лет назад
github логотип
GHSA-g2j6-57v7-gm8c

runc AppArmor bypass with symlinked /proc

CVSS3: 6.1
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2023-03869

Уязвимость инструмента для запуска изолированных контейнеров Runc, связанная с неверным определением символических ссылок перед доступом к файлу, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 7.8
0%
Низкий
около 2 лет назад
ubuntu логотип
CVE-2023-27561

runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.

CVSS3: 7
0%
Низкий
больше 2 лет назад
redhat логотип
CVE-2023-27561

runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.

CVSS3: 7
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-27561

runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.

CVSS3: 7
0%
Низкий
больше 2 лет назад
msrc логотип
CVSS3: 7
0%
Низкий
больше 2 лет назад
debian логотип
CVE-2023-27561

runc through 1.1.4 has Incorrect Access Control leading to Escalation ...

CVSS3: 7
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу