A vulnerability classified as problematic was found in Docker CLI up to 20.10.8 (Virtualization Software). This vulnerability affects the function credsStore/credHelpers
of the file ~/.docker/config.json of the component Configuration File Handler. Upgrading to version 20.10.9 eliminates this vulnerability. Applying the patch 893e52cf4ba4b048d72e99748e0f86b2767c6c6b is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.
Docker CLI up to 20.10.8 Configuration File ~/.docker/config.json credsStore/credHelpers information disclosure
- Virtual Patching
- October 5, 2021
- 8:04 am
CVE-2024-52587 : STEP-SECURITY HARDEN-RUNNER UP TO 2.10.1 ENVIRONMENT VARIABLE OS COMMAND INJECTION
Description StepSecurity’s Harden-Runner provides network egress filtering and runtime security for GitHub-hosted and self-hosted runners. Versions of step-security/harden-runner prior to
CVE-2024-50282 : LINUX KERNEL UP TO 6.11.7 AMD GPU AMDGPU_DEBUGFS_GPRWAVE_READ BUFFER OVERFLOW
Description In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() Avoid a
CVE-2024-50919 : JPRESS 5.1.1 ON WINDOWS JSP FILE UNRESTRICTED UPLOAD
Description Jpress until v5.1.1 has arbitrary file uploads on the windows platform, and the construction of non-standard file formats such