Skip to content

Latest commit

 

History

History
95 lines (81 loc) · 16.1 KB

container_cve_list.md

File metadata and controls

95 lines (81 loc) · 16.1 KB

Container CVE List

Kubernetes

There is now an officially maintained list for Kubernetes Security vulnerabilities here, I'll continue to maintain the list below for additional info links, but in general the official list is the best place for the latest vulns.

|CVE-ID |CVSS Score |Title |Affected Versions | Patched Versions | More info | |---|---|---|---|---| | CVE-2023-5528| 7.2 | Privilege escalation on Windows nodes via in-tree storage plugin | | | | | CVE-2023-3955 | 8.8 | Privilege escalation on Windows nodes due to insufficient input sanitization | | | | | CVE-2023-3893 | 8.8 | Privilege escalation via kubernetes-csi-proxy on Windows nodes | | | | | CVE-2023-3676 | 8.8 | Privilege escalation on Windows nodes due to insufficient input sanitization | | | | | CVE-2023-2431 | 3.4 | Bypass of seccomp profile enforcement| | | | | CVE-2023-2727, CVE-2023-2728 | N/A | Bypassing policies imposed by the ImagePolicyWebhook and ServiceAccount admission plugin | | | | | CVE-2023-2878 | 6.5 | Service account tokens disclosed in logs by secrets-store-csi-driver | | | | |CVE-2022-3294 | 6.6 | Node address isn't always verified when proxying | Earlier than v1.21.14, v1.22.0 - v1.22.15, v1.23.0 - v1.23.13, v1.24.0 - v1.24.7, v1.25.0 - v1.25.3 | v1.22.16, v1.23.14, v1.24.8, v1.25.4 | | |CVE-2022-3162 | 6.5 | Unauthorized read of Custom Resources | Earlier than v1.21.14, v1.22.0 - v1.22.15, v1.23.0 - v1.23.13, v1.24.0 - v1.24.7, v1.25.0 - v1.25.3 | v1.22.16, v1.23.14, v1.24.8, v1.25.4 | | |CVE-2022-3172 | 5.1 | Aggregated API server can cause clients to be redirected (SSRF) | Earlier than v1.21.14, v1.22.0 - v1.22.13, v1.23.0 - v1.23.10, v1.24.0 - v1.24.4, v1.25.0 | v1.22.14, v1.23.11, v1.24.5, v1.25.1 | | |CVE-2021-25749 | 3.4 | runAsNonRoot logic bypass for Windows containers | v1.20 - v1.21, v1.22.0 - v1.22.13, v1.23.0 - v1.23.10, v1.24.0 - v1.24.4 | v1.22.14, v1.23.11, v1.24.5, v1.25.0 | | |CVE-2020-8561 | 4.1 | Webhook redirect in kube-apiserver | All | No Patch Available | | |CVE-2021-25741| 8.8 | Symlink Exchange Can Allow Host Filesystem Access | v1.22.0 - v1.22.1, v1.21.0 - v1.21.4, v1.20.0 - v1.20.10, Earlier than v1.19.15 | v1.22.2, v1.21.5, v1.20.11, v1.19.15 | | |CVE-2021-25740| 3.1 | Endpoint & EndpointSlice permissions allow cross-Namespace forwarding | All | No Patch Available (mitigations in advisory) | | |CVE-2021-25737| 2.7 | Holes in EndpointSlice Validation Enable Host Network Hijack |v1.21.0, v1.20.0 - v1.20.6, v1.19.0 - v1.19.10, v1.16.0 - v1.18.18 | v1.21.1, v1.20.7, v1.19.11, v1.18.19 | | |CVE-2021-25736| 5.8 | Windows kube-proxy LoadBalancer contention | v1.20.0 - v1.20.5, v1.19.0 - v1.19.9, v1.18.0 - v1.18.17 | v1.21.0, v1.20.6, v1.19.10, v1.18.18 | | |CVE-2020-8562| 2.2 | Bypass of Kubernetes API Server proxy TOCTOU | v1.21.0, v1.20.0 - v1.20.6, v1.19.0 - v1.19.10, v1.18.0 - v1.18.18 | No Patch Available (mitigations in advisory) | | |CVE-2021-25735| 6.5 | Validating Admission Webhook does not observe some previous fields | v1.20.0 - v1.20.5, v1.19.0 - v1.19.9, Earlier than v1.18.17 | v1.21.0, v1.20.6, v1.19.10, v1.18.18 | | |CVE-2020-8554| 6.3 | Man in the middle using LoadBalancer or ExternalIPs | All | No Patch Available (mitigations in advisory) | | |CVE-2020-8565| 4.7 | Token Leaks in verbose logs | all v1.19 and earlier | v1.20.0 | | |CVE-2020-8559| 6.4 | Privilege escalation from compromised node to cluster | v1.18.0-1.18.5, v1.17.0-1.17.8, v1.16.0-1.16.12, all v1.15 and earlier | v1.18.6, v1.17.9, v1.16.13 | | |CVE-2020-8558| 5.4 | Kubernetes: Node setting allows for neighboring hosts to bypass localhost boundary | v1.18.0-1.18.3, v1.17.0-1.17.6, earlier than <1.16.10 | v1.18.4,v1.17.7, v1.16.11 | | |CVE-2020-8557| 5.5 | Node disk DOS by writing to container /etc/hosts | v1.18.0-1.18.5, v1.17.0-1.17.8, earlier than v1.16.13 | v1.18.6, v1.17.9, v1.16.13 | | |CVE-2020-8555| 6.3 | Half-Blind SSRF in kube-controller-manager | v1.18.0, v1.17.0 - v1.17.4, v1.16.0 - v1.16.8, earlier than < v1.15.11 | v1.18.1, v1.17.5, v1.16.9, v1.15.12 | finders blog | |CVE-2019-11254| 6.5 | denial of service vulnerability from malicious YAML payloads |v1.17.0-v1.17.2, v1.16.0-v1.16.6, earlier than v1.15.10 | v1.17.3, v1.16.7, v1.15.10 | | |CVE-2020-8552| 5.3 | Denial of service from authenticated requests to the Kube API server| v1.17.0-v1.17.2, v1.16.0-v1.16.6, earlier than v1.15.10 | v1.17.3, v1.16.7, v1.15.10 | | |CVE-2020-8551| 4.3 | Denial of service from authenticated requests to the Kubelet |v1.17.0-v1.17.2, v1.16.0-v1.16.6, v1.15.0-v1.15.10 | v1.17.3, v1.16.7, v1.15.10| | |CVE-2019-11253| 7.5 | Denial of Service from malicious YAML or JSON payloads | v1.16.0-v1.16.1, v1.15.0-v1.15-4, v1.14.0-v1.14.7, earlier than v1.13.11 | v1.16.2,v1.15.5,v1.14.8,v1.13.12 | | |CVE-2019-11251| 5.7 | kubectl cp could lead to files being create outside its destination directory | v1.15.0-v1.15.3, v1.14.0-v1.14.6, earlier than v1.13.10 | v1.16.0, v1.15.4, v1.14.7, v1.13.11 | | |CVE-2019-11248| 8.2 | The debugging endpoint /debug/pprof is exposed over the unauthenticated Kubelet healthz port | v1.14.0 - v1.14.4, v1.13.0 - v1.13.8, earlier than v1.12.10 | v1.15.0, v1.14.4, v1.13.8, and v1.12.10 | | |CVE-2019-11247| 8.1 | API server allows access to custom resources via wrong scope | v1.15.0 - v1.15.1, v1.14.0 - v1.14.5, earlier than v1.13.9 | v1.15.2, v1.14.5, v1.13.9 | | |CVE-2019-11249| 6.5 | kubectl cp potential directory traversal | v1.15.0 - v1.15.1, v1.14.0 - v1.14.5, earlier than v1.13.9 | v1.15.2, v1.14.5, v1.13.9 | | |CVE-2019-11246| 6.5 | kubectl cp could lead to files being create outside its destination directory | v1.14.0-v1.14.1, v1.13.0-v1.13.5, earlier than v1.12.9 | v1.12.9, v1.13.6, v1.14.2 | | |CVE-2019-11245| 7.8 | Security regression in Kubernetes kubelet | v1.13.6, v1.14.2 | v1.13.7, v1.14.3 | | |CVE-2019-1002101| 5.5 | kubectl - potential directory traversal in kubectl cp | v1.13.0-v1.13.4, v1.12.0-v1.12.6, earlier than v1.11.9 | v1.11.9, v1.12.7, v1.13.5, v1.14.0 | | |CVE-2019-1002100|6.5 | kube-apiserver authenticated DoS risk | v1.13.0 - v1.13.3, v1.12.0 - v1.12.5, earlier than v1.11.8 | v1.11.8, v1.12.6, v1.13.4 | | |CVE-2018-1002105|9.8 | kuberneretes Aggregated API credential re-use | v1.12.0-v1.12.2, v1.11.0-v1.11.4, earlier than v1.10.11 | v1.10.11, v1.11.5, v1.12.3 | |

runc

|CVE-ID |CVSS Score |Title |Affected Versions | Patched Versions | More Info | |CVE-2024-21626|8.6| several container breakouts due to internally leaked fds|>=v1.0.0-rc93,<=1.1.11|1.1.12|Withsecure Write-up | |CVE-2022-29162 | 7.8 | Default inheritable capabilities for linux container should be empty | < 1.1.2 | 1.1.2 | | |CVE-2021-43784 | 5.0 |Overflow in netlink bytemsg length field allows attacker to override netlink-based container configuration | <1.0.3 | 1.0.3 | | |CVE-2021-30465 | 7.6 |Container Filesystem Breakout via Directory Traversal | <= 1.0.0-rc94 |1.0.0-rc95 |Etienne Champtar's Blog | |CVE-2019-16884 | 7.5 |Apparmor restriction bypass | <= 1.0-rc8 | 1.0-rc9 | | |CVE-CVE-2019-5736 | 8.6 |Runc Privileged Escalation | <= 1.0-rc6 | 1.0-rc7 | Dragon Sector Blog | |CVE-2016-9962 | 6.4 |container escape via ptrace | Docker < 1.12.6 | Docker => 1.12.6 | |

ContainerD

|CVE-ID |CVSS Score |Title |Affected Versions | Patched Versions | More Info | | CVE-2023-25153 | 5.5 | OCI image importer memory exhaustion | <= 1.5.17, 1.6.0-1.6.17 | 1.5.18, 1.6.18 | | | CVE-2023-25173 | 5.5 | Supplementary groups are not set up properly | <= 1.5.17, 1.6.0-1.6.17 | 1.5.18, 1.6.18 | | | CVE-2022-23471 | 5.7 | containerd CRI stream server: Host memory exhaustion through Terminal resize goroutine leak | < 1.5.16, 1.6.0-1.6.11 | 1.5.16, 1.6.12 | | | CVE-2022-31030 | 5.5 | containerd CRI plugin: Host memory exhaustion through ExecSync | <= 1.5.12, 1.6.0, 1.6.1, 1.6.2, 1.6.3, 1.6.4, 1.6.5 | 1.5.13, 1.6.6 | | | CVE-2022-24769 | 5.9 | Default inheritable capabilities for linux container should be empty | <= 1.5.10, 1.6.0, 1.6.1 | 1.5.11, 1.6.2 | | | CVE-2022-23648 | 7.5 | containerd CRI plugin: Insecure handling of image volumes | <= 1.4.12, 1.5.0 - 1.5.9, 1.6.0 | 1.4.13, 1.5.10, 1.6.1 | PoC repo | | CVE-2021-43816 | 9.1 | containerd CRI plugin: Unprivileged pod using hostPath can side-step SELinux | >= 1.5.0, < 1.5.9 | 1.5.9 | | | CVE-2021-41103 | 5.9 | nsufficiently restricted permissions on container root and plugin directories | <1.4.11,<1.5.7 | 1.4.11,1.5.7 | | | CVE-2021-32760 | 6.3 | Archive package allows chmod of file outside of unpack target directory | <=1.4.7, <=1.5.3 | 1.5.4, 1.4.8 | | | CVE-2021-21334 | 6.3 | containerd CRI plugin: environment variables can leak between containers | <=1.3.9, <= 1.4.3 | 1.3.10, 1.4.4 | | | CVE-2020-15157 | 6.1 | containerd v1.2.x can be coerced into leaking credentials during image pull | < 1.3.0 | 1.2.14, 1.3.0 | Darkbit Blog Post | | CVE-2020-15257 | 5.2 | containerd-shim API exposed to host network containers | <=1.3.7, 1.4.0, 1.4.1 | 1.3.9, 1.4.3 | NCC Group Technical Vulnerability Discussion |

Docker

|CVE-ID |CVSS Score |Title |Affected Versions | Patched Versions | More Info | | CVE-2022-36109 | 6.3 | Security vulnerability relating to supplementary group permissions | < 20.10.18 | 20.10.18 | | | CVE-2021-41190 | 5.0 | Ambiguous OCI manifest parsing | < 20.10.11 | 20.10.11 | | | CVE-2021-41091 | 6.3 | Insufficiently restricted permissions on data directory | < 20.10.9 | 20.10.9 | Cyberark blog post | | CVE-2021-41089 | 6.3 | docker cp allows unexpected chmod of host files | < 20.10.9 | 20.10.9 | | | CVE-2021-21285 | 6.5 | Docker daemon crash during image pull of malicious image | < 19.03.15, < 20.10.3 | 19.03.15, 20.10.3 | | | CVE-2021-21284 | 6.8 | Access to remapped root allows privilege escalation to real root | < 19.03.15, < 20.10.3 | 19.03.15, 20.10.3 | | | CVE-2020-27534 | 5.3 | Docker calls os.OpenFile with a potentially unsafe qemu-check temporary pathname | < 19.03.9 | 19.03.9 | | | CVE-2019-14271 | 9.8 | docker cp vulnerability | 19.03 | 19.03.1 | Tenable Blog Post | | CVE-2019-13509 | 7.5 | Docker Engine in debug mode may sometimes add secrets to the debug log | < 18.09.8 | 18.09.8 | | | CVE-2019-13139 | 8.4 | Manipulation of the build path for the "docker build" command could allow for command execution | < 18.09.4 | 18.09.4 | | | CVE-2018-15664 | 7.5 | docker cp race condition | < 18.06.1-ce-rc2 | 18.06.1-ce-rc2 | Capsule8 blog post | | CVE-2017-14992 | 6.5 | Dos via gzip bomb | < 17.09.1 | 17.09.1 | |

| | | | | | |