{"id":"UBUNTU-CVE-2022-47747","details":"kraken \u003c= 0.1.4 has an arbitrary file read vulnerability via the component testfs.","modified":"2026-01-20T18:07:18.658171Z","published":"2023-01-20T17:15:00Z","upstream":["CVE-2022-47747"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-47747"},{"type":"REPORT","url":"https://github.com/uber/kraken/issues/333"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2022-47747"}],"affected":[{"package":{"name":"kraken","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/kraken@0.10.5~beta-2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.10.5~beta-1","0.10.5~beta-2"],"ecosystem_specific":{"binaries":[{"binary_name":"kraken","binary_version":"0.10.5~beta-2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-47747.json"}},{"package":{"name":"kraken","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/kraken@1.1-2?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.10.5~beta-5","0.10.5~beta-6","1.1-2"],"ecosystem_specific":{"binaries":[{"binary_name":"kraken","binary_version":"1.1-2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-47747.json"}},{"package":{"name":"kraken","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/kraken@1.1.1-1build1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.1.1-1","1.1.1-1build1"],"ecosystem_specific":{"binaries":[{"binary_name":"kraken","binary_version":"1.1.1-1build1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-47747.json"}},{"package":{"name":"kraken","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/kraken@1.1.1-3?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.1.1-2","1.1.1-3"],"ecosystem_specific":{"binaries":[{"binary_name":"kraken","binary_version":"1.1.1-3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-47747.json"}},{"package":{"name":"kraken","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/kraken@1.1.1-4?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.1.1-4"],"ecosystem_specific":{"binaries":[{"binary_name":"kraken","binary_version":"1.1.1-4"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-47747.json"}},{"package":{"name":"kraken","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/kraken@1.1.1-4?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.1.1-4"],"ecosystem_specific":{"binaries":[{"binary_name":"kraken","binary_version":"1.1.1-4"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-47747.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}]}