Vulnerability Name: | CVE-2022-2995 (CCN-236923) | ||||||||||||
Assigned: | 2022-08-22 | ||||||||||||
Published: | 2022-08-22 | ||||||||||||
Updated: | 2022-09-21 | ||||||||||||
Summary: | Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container. | ||||||||||||
CVSS v3 Severity: | 7.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N) 6.2 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)
6.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.2 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:C/A:N)
| ||||||||||||
Vulnerability Type: | CWE-732 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-2995 Source: XF Type: UNKNOWN crio-cve20222995-code-exec(236923) Source: CCN Type: CRI-O GIT Repository server: add container GID to additional groups #6159 Source: MISC Type: Patch, Third Party Advisory https://github.com/cri-o/cri-o/pull/6159 Source: MISC Type: Exploit, Third Party Advisory https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/ Source: CCN Type: Mend Vulnerability Database CVE-2022-2995 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||
BACK |