Inclusion of Functionality from Untrusted Control Sphere
CVE-2022-4134
Summary
A flaw was found in glance. This issue could allow a remote, authenticated attacker to tamper with images, compromising the integrity of virtual machines created using these modified images.
- LOW
- LOCAL
- LOW
- UNCHANGED
- REQUIRED
- LOW
- NONE
- NONE
CWE-829 - Inclusion of Functionality from Untrusted Control Sphere
The software imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.
References
Advisory Timeline
- Published