Download
| Alert*
oval:org.secpod.oval:def:62270
The host is installed with Docker CE through 19.03.2 and is prone to an incorrect authorization vulnerability. A flaw is present in the application, which fails to handle incorrectly checked mount targets. Successful exploitation could allow attackers to mount a malicious Docker image over a /proc d ... oval:org.secpod.oval:def:503632 Docker is an open-source engine that automates the deployment of any application as a lightweight, portable, self-sufficient container that runs virtually anywhere. Security Fix: * runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc * proglottis/gpgme: Use-after-free ... oval:org.secpod.oval:def:117208 The runc command can be used to start containers which are packaged in accordance with the Open Container Initiative's specifications, and to manage containers running under runc. oval:org.secpod.oval:def:1601505 runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory oval:org.secpod.oval:def:117203 The runc command can be used to start containers which are packaged in accordance with the Open Container Initiative's specifications, and to manage containers running under runc. oval:org.secpod.oval:def:1700773 runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory. A flaw was found in runc. An attacker who con ... oval:org.secpod.oval:def:62021 runc: Open Container Project Several security issues were fixed in runc. oval:org.secpod.oval:def:1700742 runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory. A flaw was found in runc. An attacker who con ... oval:org.secpod.oval:def:61687 runc: Open Container Project Several security issues were fixed in runc. oval:org.secpod.oval:def:1502760 The advisory is missing the security advisory description. For more information please visit the reference link oval:org.secpod.oval:def:2501015 The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. oval:org.secpod.oval:def:66674 The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix: * HTTP/2: flood using PING frames results in unbounded memory growth * HTTP/2: flood using HEADERS frames results in unbounded memory growth * runc: AppArmor/SELinux bypa ... |