Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.
References
Link | Resource |
---|---|
https://github.com/cri-o/cri-o/pull/6159 | Patch Third Party Advisory |
https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/ | Exploit Third Party Advisory |
https://github.com/cri-o/cri-o/pull/6159 | Patch Third Party Advisory |
https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/cri-o/cri-o/pull/6159 - Patch, Third Party Advisory | |
References | () https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/ - Exploit, Third Party Advisory |
Information
Published : 2022-09-19 20:15
Updated : 2024-11-21 07:02
NVD link : CVE-2022-2995
Mitre link : CVE-2022-2995
CVE.ORG link : CVE-2022-2995
JSON object : View
Products Affected
kubernetes
- cri-o