Количество 15
Количество 15
GHSA-hmfx-3pcx-653p
Supplementary groups are not set up properly in github.com/containerd/containerd

CVE-2023-25173
containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container ...

CVE-2023-25173
containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container ...

CVE-2023-25173
containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container en

CVE-2023-25173
CVE-2023-25173
containerd is an open source container runtime. A bug was found in con ...

BDU:2023-01488
Уязвимость среды выполнения контейнеров Containerd, связанная с недостатками разграничения доступа, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или выполнить произвольный код

SUSE-SU-2023:4124-1
Security update for helm

SUSE-SU-2023:1827-1
Security update for containerd

SUSE-SU-2023:1826-1
Security update for containerd

ROS-20230322-02
Множественные уязвимости containerd
ELSA-2023-6473
ELSA-2023-6473: buildah security update (MODERATE)
ELSA-2023-6474
ELSA-2023-6474: podman security, bug fix, and enhancement update (MODERATE)

ROS-20240418-06
Множественные уязвимости buildah
ELSA-2023-6939
ELSA-2023-6939: container-tools:ol8 security and bug fix update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-hmfx-3pcx-653p Supplementary groups are not set up properly in github.com/containerd/containerd | CVSS3: 5.3 | 0% Низкий | больше 2 лет назад | |
![]() | CVE-2023-25173 containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container ... | CVSS3: 5.3 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2023-25173 containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container ... | CVSS3: 7.3 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2023-25173 containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container en | CVSS3: 5.3 | 0% Низкий | больше 2 лет назад |
![]() | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад | |
CVE-2023-25173 containerd is an open source container runtime. A bug was found in con ... | CVSS3: 5.3 | 0% Низкий | больше 2 лет назад | |
![]() | BDU:2023-01488 Уязвимость среды выполнения контейнеров Containerd, связанная с недостатками разграничения доступа, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или выполнить произвольный код | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад |
![]() | SUSE-SU-2023:4124-1 Security update for helm | больше 1 года назад | ||
![]() | SUSE-SU-2023:1827-1 Security update for containerd | около 2 лет назад | ||
![]() | SUSE-SU-2023:1826-1 Security update for containerd | около 2 лет назад | ||
![]() | ROS-20230322-02 Множественные уязвимости containerd | CVSS3: 7.8 | около 2 лет назад | |
ELSA-2023-6473 ELSA-2023-6473: buildah security update (MODERATE) | больше 1 года назад | |||
ELSA-2023-6474 ELSA-2023-6474: podman security, bug fix, and enhancement update (MODERATE) | больше 1 года назад | |||
![]() | ROS-20240418-06 Множественные уязвимости buildah | CVSS3: 9.8 | около 1 года назад | |
ELSA-2023-6939 ELSA-2023-6939: container-tools:ol8 security and bug fix update (MODERATE) | больше 1 года назад |
Уязвимостей на страницу