Filtered by vendor Google Subscriptions
Filtered by product Gvisor Subscriptions
Total 7 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-10026 1 Google 1 Gvisor 2025-07-31 5.3 Medium
A weak hashing algorithm and small sizes of seeds/secrets in Google's gVisor allowed for a remote attacker to calculate a local IP address and a per-boot identifier that could aid in tracking of a device in certain circumstances.
CVE-2024-10603 1 Google 1 Gvisor 2025-07-29 5.3 Medium
Weaknesses in the generation of TCP/UDP source ports and some other header values in Google's gVisor allowed them to be predicted by an external attacker in some circumstances.
CVE-2023-7258 1 Google 1 Gvisor 2025-07-22 4.8 Medium
A denial of service exists in Gvisor Sandbox where a bug in reference counting code in mount point tracking could lead to a panic, making it possible for an attacker running as root and with permission to mount volumes to kill the sandbox. We recommend upgrading past commit 6a112c60a257dadac59962e0bc9e9b5aee70b5b6
CVE-2025-2713 1 Google 1 Gvisor 2025-07-12 N/A
Google gVisor's runsc component exhibited a local privilege escalation vulnerability due to incorrect handling of file access permissions, which allowed unprivileged users to access restricted files. This occurred because the process initially ran with root-like permissions until the first fork.
CVE-2018-20168 1 Google 1 Gvisor 2024-11-21 N/A
Google gVisor before 2018-08-22 reuses a pagetable in a different level with the paging-structure cache intact, which allows attackers to cause a denial of service ("physical address not valid" panic) via a crafted application.
CVE-2018-19333 1 Google 1 Gvisor 2024-11-21 N/A
pkg/sentry/kernel/shm/shm.go in Google gVisor before 2018-11-01 allows attackers to overwrite memory locations in processes running as root (but not escape the sandbox) via vectors involving IPC_RMID shmctl calls, because reference counting is mishandled.
CVE-2018-16359 1 Google 1 Gvisor 2024-11-21 N/A
Google gVisor before 2018-08-23, within the seccomp sandbox, permits access to the renameat system call, which allows attackers to rename files on the host OS.