VYPR

apk package

chainguard/ctop

pkg:apk/chainguard/ctop

Vulnerabilities (81)

  • CVE-2023-45284Nov 9, 2023
    affected < 0fixed 0

    On Windows, The IsLocal function does not correctly detect reserved device names in some cases. Reserved names followed by spaces, such as "COM1 ", and reserved names "COM" and "LPT" followed by superscript 1, 2, or 3, are incorrectly reported as local. With fix, IsLocal now corr

  • CVE-2023-45283Nov 9, 2023
    affected < 0fixed 0

    The filepath package does not recognize paths with a \??\ prefix as special. On Windows, a path beginning with \??\ is a Root Local Device path equivalent to a path beginning with \\?\. Paths with a \??\ prefix may be used to access arbitrary locations on the system. For example,

  • CVE-2023-28840Apr 4, 2023
    affected < 0.7.7-r13fixed 0.7.7-r13

    Moby is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as moby/moby, is commonly referred to as *Docke

  • CVE-2023-28841Apr 4, 2023
    affected < 0.7.7-r13fixed 0.7.7-r13

    Moby is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as moby/moby is commonly referred to as *Docker

  • CVE-2023-28842Apr 4, 2023
    affected < 0.7.7-r13fixed 0.7.7-r13

    Moby) is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as moby/moby is commonly referred to as *Docke

  • CVE-2023-25809Mar 29, 2023
    affected < 0.7.7-r13fixed 0.7.7-r13

    runc is a CLI tool for spawning and running containers according to the OCI specification. In affected versions it was found that rootless runc makes `/sys/fs/cgroup` writable in following conditons: 1. when runc is executed inside the user namespace, and the `config.json` does n

  • CVE-2023-28642Mar 29, 2023
    affected < 0.7.7-r13fixed 0.7.7-r13

    runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibitin

  • CVE-2023-27561Mar 3, 2023
    affected < 0.7.7-r13fixed 0.7.7-r13

    runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this is

  • CVE-2023-25173Feb 16, 2023
    affected < 0.7.7-r13fixed 0.7.7-r13

    containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group acces

  • CVE-2023-25153Feb 16, 2023
    affected < 0.7.7-r13fixed 0.7.7-r13

    containerd is an open source container runtime. Before versions 1.6.18 and 1.5.18, when importing an OCI image, there was no limit on the number of bytes read for certain files. A maliciously crafted image with a large file where a limit was not applied could cause a denial of se

  • CVE-2022-23471Dec 7, 2022
    affected < 0.7.7-r13fixed 0.7.7-r13

    containerd is an open source container runtime. A bug was found in containerd's CRI implementation where a user can exhaust memory on the host. In the CRI stream server, a goroutine is launched to handle terminal resize events if a TTY is requested. If the user's process fails to

  • CVE-2022-29526Jun 22, 2022
    affected < 0.7.7-r13fixed 0.7.7-r13

    Go before 1.17.10 and 1.18.x before 1.18.2 has Incorrect Privilege Assignment. When called with a non-zero flags parameter, the Faccessat function could incorrectly report that a file is accessible.

  • CVE-2022-31030Jun 6, 2022
    affected < 0.7.7-r13fixed 0.7.7-r13

    containerd is an open source container runtime. A bug was found in the containerd's CRI implementation where programs inside a container can cause the containerd daemon to consume memory without bound during invocation of the `ExecSync` API. This can cause containerd to consume a

  • CVE-2022-29162May 17, 2022
    affected < 0.7.7-r13fixed 0.7.7-r13

    runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. A bug was found in runc prior to version 1.1.2 where `runc exec --cap` created processes with non-empty inheritable Linux process capabilities, creating an atypical Linux environme

  • CVE-2022-24769Mar 24, 2022
    affected < 0.7.7-r13fixed 0.7.7-r13

    Moby is an open-source project created by Docker to enable and accelerate software containerization. A bug was found in Moby (Docker Engine) prior to version 20.10.14 where containers were incorrectly started with non-empty inheritable Linux process capabilities, creating an atyp

  • CVE-2022-23648Mar 3, 2022
    affected < 0.7.7-r13fixed 0.7.7-r13

    containerd is a container runtime available as a daemon for Linux and Windows. A bug was found in containerd prior to versions 1.6.1, 1.5.10, and 1.14.12 where containers launched through containerd’s CRI implementation on Linux with a specially-crafted image configuration could

  • CVE-2021-41103Oct 4, 2021
    affected < 0.7.7-r13fixed 0.7.7-r13

    containerd is an open source container runtime with an emphasis on simplicity, robustness and portability. A bug was found in containerd where container root directories and some plugins had insufficiently restricted permissions, allowing otherwise unprivileged Linux users to tra

  • CVE-2021-32760Jul 19, 2021
    affected < 0.7.7-r13fixed 0.7.7-r13

    containerd is a container runtime. A bug was found in containerd versions prior to 1.4.8 and 1.5.4 where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host’s filesystem. Changes to file permissions

  • CVE-2021-21334Mar 10, 2021
    affected < 0.7.7-r13fixed 0.7.7-r13

    In containerd (an industry-standard container runtime) before versions 1.3.10 and 1.4.4, containers launched through containerd's CRI implementation (through Kubernetes, crictl, or any other pod/container client that uses the containerd CRI service) that share the same image may

  • CVE-2021-3121Jan 11, 2021
    affected < 0.7.7-r13fixed 0.7.7-r13

    An issue was discovered in GoGo Protobuf before 1.3.2. plugin/unmarshal/unmarshal.go lacks certain index validation, aka the "skippy peanut butter" issue.

Page 4 of 5