Download
| Alert*
oval:org.secpod.oval:def:70567
containerd: daemon to control runC The system could be made to expose sensitive information. oval:org.secpod.oval:def:89044390 This update for containerd, docker, runc fixes the following issues: Docker was updated to 20.10.6-ce * Switch version to use -ce suffix rather than _ce to avoid confusing other tools . * CVE-2021-21284: Fixed a potential privilege escalation when the root user in the remapped namespace has access ... oval:org.secpod.oval:def:119576 Cri is a native plugin of containerd 1.1 and above. It is built into containerd and enabled by default. oval:org.secpod.oval:def:119573 Containerd is an industry-standard container runtime with an emphasis on simplicity, robustness and portability. It is available as a daemon for Linux and Windows, which can manage the complete container lifecycle of its host system: image transfer and storage, container execution and supervision, l ... oval:org.secpod.oval:def:1700775 A flaw was found in containerd CRI plugin. Containers launched through containerd#39;s CRI implementation that share the same image may receive incorrect environment variables, including values that are defined for other containers. The highest threat from this vulnerability is to data confidentiali ... oval:org.secpod.oval:def:1700746 A flaw was found in containerd CRI plugin. Containers launched through containerd#39;s CRI implementation that share the same image may receive incorrect environment variables, including values that are defined for other containers. The highest threat from this vulnerability is to data confidentiali ... oval:org.secpod.oval:def:705936 containerd: daemon to control runC The system could be made to expose sensitive information. oval:org.secpod.oval:def:1701883 A flaw was found in containerd CRI plugin. Containers launched through containerd CRI implementation that share the same image may receive incorrect environment variables, including values that are defined for other containers. The highest threat from this vulnerability is to data confidentiality oval:org.secpod.oval:def:1601462 A bug was discovered in containerd where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host"s filesystem. Changes to file permissions can deny access to the expected owner of the file or widen access to others. A flaw ... |