cvelist/2018/1000xxx/CVE-2018-1000400.json

70 lines
2.3 KiB
JSON
Raw Normal View History

2018-05-18 10:25:34 -06:00
{
2019-03-18 04:49:08 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-05-18T10:04:59.544719",
"DATE_REQUESTED": "2018-05-18T16:33:44",
"ID": "CVE-2018-1000400",
"REQUESTER": "kseifried@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2018-05-18 14:05:51 -04:00
{
2019-03-18 04:49:08 +00:00
"lang": "eng",
"value": "Kubernetes CRI-O version prior to 1.9 contains a Privilege Context Switching Error (CWE-270) vulnerability in the handling of ambient capabilities that can result in containers running with elevated privileges, allowing users abilities they should not have. This attack appears to be exploitable via container execution. This vulnerability appears to have been fixed in 1.9."
2018-05-18 14:05:51 -04:00
}
2019-03-18 04:49:08 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/kubernetes-incubator/cri-o/pull/1558/files",
"refsource": "MISC",
"url": "https://github.com/kubernetes-incubator/cri-o/pull/1558/files"
},
{
"name": "104262",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104262"
}
]
}
}