Skip to main content

Inclusion of Functionality from Untrusted Control Sphere

CVE-2022-4134

Severity Low
Score 2.8/10

Summary

A flaw was found in glance. This issue could allow a remote, authenticated attacker to tamper with images, compromising the integrity of virtual machines created using these modified images.

  • LOW
  • LOCAL
  • LOW
  • UNCHANGED
  • REQUIRED
  • LOW
  • NONE
  • NONE

CWE-829 - Inclusion of Functionality from Untrusted Control Sphere

The software imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.

Advisory Timeline

  • Published