Show filters
73 Total Results
Displaying 21-30 of 73
Sort by:
Attacker Value
Unknown

CVE-2022-2990

Disclosure Date: September 13, 2022 (last updated October 08, 2023)
An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.
Attacker Value
Unknown

CVE-2022-2989

Disclosure Date: September 13, 2022 (last updated October 08, 2023)
An incorrect handling of the supplementary groups in the Podman container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.
Attacker Value
Unknown

CVE-2022-1632

Disclosure Date: September 01, 2022 (last updated October 08, 2023)
An Improper Certificate Validation attack was found in Openshift. A re-encrypt Route with destinationCACertificate explicitly set to the default serviceCA skips internal Service TLS certificate validation. This flaw allows an attacker to exploit an invalid certificate, resulting in a loss of confidentiality.
Attacker Value
Unknown

CVE-2022-2132

Disclosure Date: August 31, 2022 (last updated October 08, 2023)
A permissive list of allowed inputs flaw was found in DPDK. This issue allows a remote attacker to cause a denial of service triggered by sending a crafted Vhost header to DPDK.
Attacker Value
Unknown

CVE-2022-0718

Disclosure Date: August 29, 2022 (last updated October 08, 2023)
A flaw was found in python-oslo-utils. Due to improper parsing, passwords with a double quote ( " ) in them cause incorrect masking in debug logs, causing any part of the password after the double quote to be plaintext.
Attacker Value
Unknown

CVE-2022-0669

Disclosure Date: August 29, 2022 (last updated October 08, 2023)
A flaw was found in dpdk. This flaw allows a malicious vhost-user master to attach an unexpected number of fds as ancillary data to VHOST_USER_GET_INFLIGHT_FD / VHOST_USER_SET_INFLIGHT_FD messages that are not closed by the vhost-user slave. By sending such messages continuously, the vhost-user master exhausts available fd in the vhost-user slave process, leading to a denial of service.
Attacker Value
Unknown

CVE-2021-3669

Disclosure Date: August 26, 2022 (last updated October 08, 2023)
A flaw was found in the Linux kernel. Measuring usage of the shared memory does not scale with large shared memory segment counts which could lead to resource exhaustion and DoS.
Attacker Value
Unknown

CVE-2021-3979

Disclosure Date: August 25, 2022 (last updated October 24, 2023)
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
Attacker Value
Unknown

CVE-2022-1708

Disclosure Date: June 07, 2022 (last updated October 07, 2023)
A vulnerability was found in CRI-O that causes memory or disk space exhaustion on the node for anyone with access to the Kube API. The ExecSync request runs commands in a container and logs the output of the command. This output is then read by CRI-O after command execution, and it is read in a manner where the entire file corresponding to the output of the command is read in. Thus, if the output of the command is large it is possible to exhaust the memory or the disk space of the node when CRI-O reads the output of the command. The highest threat from this vulnerability is system availability.
Attacker Value
Unknown

CVE-2022-1706

Disclosure Date: May 17, 2022 (last updated October 07, 2023)
A vulnerability was found in Ignition where ignition configs are accessible from unprivileged containers in VMs running on VMware products. This issue is only relevant in user environments where the Ignition config contains secrets. The highest threat from this vulnerability is to data confidentiality. Possible workaround is to not put secrets in the Ignition config.