Google

Gvisor

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 28.03.2025 15:27:43
  • Zuletzt bearbeitet 26.09.2025 17:16:51

Google gVisor's runsc component exhibited a local privilege escalation vulnerability due to incorrect handling of file access permissions, which allowed unprivileged users to access restricted files. This occurred because the process initially ran wi...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 30.01.2025 20:15:32
  • Zuletzt bearbeitet 31.07.2025 18:33:50

A weak hashing algorithm and small sizes of seeds/secrets in Google's gVisor allowed for a remote attacker to calculate a local IP address and a per-boot identifier that could aid in tracking of a device in certain circumstances.

Exploit
  • EPSS 0.06%
  • Veröffentlicht 30.01.2025 20:15:32
  • Zuletzt bearbeitet 29.07.2025 18:33:17

Weaknesses in the generation of TCP/UDP source ports and some other header values in Google's gVisor allowed them to be predicted by an external attacker in some circumstances.

  • EPSS 0.12%
  • Veröffentlicht 15.05.2024 17:15:09
  • Zuletzt bearbeitet 22.07.2025 21:06:27

A denial of service exists in Gvisor Sandbox where a bug in reference counting code in mount point tracking could lead to a panic, making it possible for an attacker running as root and with permission to mount volumes to kill the sandbox. We recomme...

  • EPSS 0.05%
  • Veröffentlicht 17.12.2018 05:29:01
  • Zuletzt bearbeitet 21.11.2024 04:00:59

Google gVisor before 2018-08-22 reuses a pagetable in a different level with the paging-structure cache intact, which allows attackers to cause a denial of service ("physical address not valid" panic) via a crafted application.

Exploit
  • EPSS 0.17%
  • Veröffentlicht 17.11.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:57:44

pkg/sentry/kernel/shm/shm.go in Google gVisor before 2018-11-01 allows attackers to overwrite memory locations in processes running as root (but not escape the sandbox) via vectors involving IPC_RMID shmctl calls, because reference counting is mishan...

  • EPSS 0.12%
  • Veröffentlicht 02.09.2018 22:29:00
  • Zuletzt bearbeitet 21.11.2024 03:52:35

Google gVisor before 2018-08-23, within the seccomp sandbox, permits access to the renameat system call, which allows attackers to rename files on the host OS.