Логотип exploitDog
bind:"CVE-2024-21626" OR bind:"CVE-2023-45287"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-21626" OR bind:"CVE-2023-45287"

Количество 33

Количество 33

oracle-oval логотип

ELSA-2024-0748

почти 2 года назад

ELSA-2024-0748: container-tools:4.0 security update (IMPORTANT)

EPSS: Низкий
rocky логотип

RLSA-2024:0748

7 месяцев назад

Important: container-tools:4.0 security update

EPSS: Низкий
ubuntu логотип

CVE-2023-45287

около 2 лет назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2023-45287

около 2 лет назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2023-45287

около 2 лет назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2023-45287

3 месяца назад

Before Go 1.20, the RSA based key exchange methods in crypto/tls may exhibit a timing side channel

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2023-45287

около 2 лет назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big libr ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2024-21626

почти 2 года назад

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue.

CVSS3: 8.6
EPSS: Низкий
redhat логотип

CVE-2024-21626

почти 2 года назад

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue.

CVSS3: 8.6
EPSS: Низкий
nvd логотип

CVE-2024-21626

почти 2 года назад

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue.

CVSS3: 8.6
EPSS: Низкий
msrc логотип

CVE-2024-21626

почти 2 года назад

GitHub: CVE-2024-21626 Container breakout through process.cwd trickery and leaked fds

EPSS: Низкий
debian логотип

CVE-2024-21626

почти 2 года назад

runc is a CLI tool for spawning and running containers on Linux accord ...

CVSS3: 8.6
EPSS: Низкий
github логотип

GHSA-33qr-2xwr-95pw

около 2 лет назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
EPSS: Низкий
oracle-oval логотип

ELSA-2024-2239

больше 1 года назад

ELSA-2024-2239: skopeo security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0459-1

почти 2 года назад

Security update for runc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0328-1

почти 2 года назад

Security update for runc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0295-1

почти 2 года назад

Security update for runc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0294-1

почти 2 года назад

Security update for runc

EPSS: Низкий
rocky логотип

RLSA-2024:0752

почти 2 года назад

Important: container-tools:rhel8 security update

EPSS: Низкий
github логотип

GHSA-xr7r-f8xq-vfvv

почти 2 года назад

runc vulnerable to container breakout through process.cwd trickery and leaked fds

CVSS3: 8.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2024-0748

ELSA-2024-0748: container-tools:4.0 security update (IMPORTANT)

почти 2 года назад
rocky логотип
RLSA-2024:0748

Important: container-tools:4.0 security update

7 месяцев назад
ubuntu логотип
CVE-2023-45287

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-45287

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-45287

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
0%
Низкий
около 2 лет назад
msrc логотип
CVE-2023-45287

Before Go 1.20, the RSA based key exchange methods in crypto/tls may exhibit a timing side channel

CVSS3: 7.5
0%
Низкий
3 месяца назад
debian логотип
CVE-2023-45287

Before Go 1.20, the RSA based TLS key exchanges used the math/big libr ...

CVSS3: 7.5
0%
Низкий
около 2 лет назад
ubuntu логотип
CVE-2024-21626

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue.

CVSS3: 8.6
5%
Низкий
почти 2 года назад
redhat логотип
CVE-2024-21626

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue.

CVSS3: 8.6
5%
Низкий
почти 2 года назад
nvd логотип
CVE-2024-21626

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue.

CVSS3: 8.6
5%
Низкий
почти 2 года назад
msrc логотип
CVE-2024-21626

GitHub: CVE-2024-21626 Container breakout through process.cwd trickery and leaked fds

5%
Низкий
почти 2 года назад
debian логотип
CVE-2024-21626

runc is a CLI tool for spawning and running containers on Linux accord ...

CVSS3: 8.6
5%
Низкий
почти 2 года назад
github логотип
GHSA-33qr-2xwr-95pw

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
0%
Низкий
около 2 лет назад
oracle-oval логотип
ELSA-2024-2239

ELSA-2024-2239: skopeo security update (MODERATE)

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:0459-1

Security update for runc

5%
Низкий
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2024:0328-1

Security update for runc

5%
Низкий
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2024:0295-1

Security update for runc

5%
Низкий
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2024:0294-1

Security update for runc

5%
Низкий
почти 2 года назад
rocky логотип
RLSA-2024:0752

Important: container-tools:rhel8 security update

5%
Низкий
почти 2 года назад
github логотип
GHSA-xr7r-f8xq-vfvv

runc vulnerable to container breakout through process.cwd trickery and leaked fds

CVSS3: 8.6
5%
Низкий
почти 2 года назад

Уязвимостей на страницу