
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was discovered in ostree before version 2022.7 (CVE-2022-47085) that allows attackers to cause a denial of service or other unspecified impacts through the printpanic function in repocheckout_filter.rs. The vulnerability was disclosed on July 18, 2023 (NVD).
The vulnerability exists in the printpanic function within repocheckout_filter.rs file of ostree. The issue involves the use of eprintln! macro for error message output, which can trigger a panic if writing to io::stderr fails. This could lead to undefined behavior when unwinding reaches the C ABI boundary (GitHub Issue). The vulnerability has been assigned a CVSS v3.1 Base Score of 7.5 HIGH with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (NVD).
The vulnerability can allow attackers to cause a denial of service condition or have other unspecified impacts on the affected system. The high CVSS score of 7.5 indicates significant potential for availability impact, though confidentiality and integrity are not affected (NVD).
The vulnerability has been fixed in ostree version 2022.7 and later releases. Users should upgrade to this version or newer to mitigate the vulnerability (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."