Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.
References
Link | Resource |
---|---|
https://github.com/cri-o/cri-o/pull/6159 | Patch Third Party Advisory |
https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/ | Exploit Third Party Advisory |
https://github.com/cri-o/cri-o/pull/6159 | Patch Third Party Advisory |
https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-09-19 20:15
Updated : 2024-11-21 07:02
NVD link : CVE-2022-2995
Mitre link : CVE-2022-2995
CVE.ORG link : CVE-2022-2995
JSON object : View
Products Affected
kubernetes
- cri-o