CVE-2022-2995

ADVISORY - github

Summary

Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.

EPSS Score: 0.00032 (0.089)

Common Weakness Enumeration (CWE)

ADVISORY - nist

Improper Access Control

Incorrect Permission Assignment for Critical Resource

ADVISORY - github

Improper Access Control

Incorrect Permission Assignment for Critical Resource

ADVISORY - gitlab

OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities

Incorrect Permission Assignment for Critical Resource

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities

ADVISORY - gitlab

OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities

Incorrect Authorization

OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities

ADVISORY - redhat

Improper Access Control


Sign in to Docker Scout

See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.

Sign in