Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/containerd@1.4.13~ds1-1~deb11u4
Typedeb
Namespacedebian
Namecontainerd
Version1.4.13~ds1-1~deb11u4
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.5.8~ds1-3
Latest_non_vulnerable_version1.7.24~ds1-4
Affected_by_vulnerabilities
0
url VCID-f2yv-ut5v-m7ey
vulnerability_id VCID-f2yv-ut5v-m7ey
summary
containerd affected by a local privilege escalation via wide permissions on CRI directory
### Impact

An overly broad default permission vulnerability was found in containerd.

- `/var/lib/containerd` was created with the permission bits 0o711, while it should be created with 0o700
  - Allowed local users on the host to potentially access the metadata store and the content store
- `/run/containerd/io.containerd.grpc.v1.cri` was created with 0o755, while it should be created with 0o700
  - Allowed local users on the host to potentially access the contents of Kubernetes local volumes. The contents of volumes might include setuid binaries, which could allow a local user on the host to elevate privileges on the host.
- `/run/containerd/io.containerd.sandbox.controller.v1.shim` was created with 0o711, while it should be created with 0o700

The directory paths may differ depending on the daemon configuration.
When the `temp` directory path is specified in the daemon configuration, that directory was also created with 0o711, while it should be created with 0o700.

### Patches

This bug has been fixed in the following containerd versions:

* 2.2.0
* 2.1.5
* 2.0.7
* 1.7.29

Users should update to these versions to resolve the issue.
These updates automatically change the permissions of the existing directories.

> [!NOTE]
>
> `/run/containerd` and `/run/containerd/io.containerd.runtime.v2.task` are still created with 0o711.
> This is an expected behavior for supporting userns-remapped containers.

### Workarounds

The system administrator on the host can manually chmod the directories to not 
have group or world accessible permisisons:

```
chmod 700 /var/lib/containerd
chmod 700 /run/containerd/io.containerd.grpc.v1.cri
chmod 700 /run/containerd/io.containerd.sandbox.controller.v1.shim
```

An alternative mitigation would be to run containerd in [rootless mode](https://github.com/containerd/containerd/blob/main/docs/rootless.md).

### Credits

The containerd project would like to thank David Leadbeater for responsibly disclosing this issue in accordance with the [containerd security policy](https://github.com/containerd/project/blob/main/SECURITY.md).

### For more information

If you have any questions or comments about this advisory:

* Open an issue in [containerd](https://github.com/containerd/containerd/issues/new/choose)
* Email us at [security@containerd.io](mailto:security@containerd.io)

To report a security issue in containerd:

* [Report a new vulnerability](https://github.com/containerd/containerd/security/advisories/new)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-25621.json
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-25621.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-25621
reference_id
reference_type
scores
0
value 4e-05
scoring_system epss
scoring_elements 0.00195
published_at 2026-04-26T12:55:00Z
1
value 4e-05
scoring_system epss
scoring_elements 0.00192
published_at 2026-04-18T12:55:00Z
2
value 4e-05
scoring_system epss
scoring_elements 0.00191
published_at 2026-04-16T12:55:00Z
3
value 4e-05
scoring_system epss
scoring_elements 0.00149
published_at 2026-04-08T12:55:00Z
4
value 4e-05
scoring_system epss
scoring_elements 0.00151
published_at 2026-04-11T12:55:00Z
5
value 4e-05
scoring_system epss
scoring_elements 0.00157
published_at 2026-04-04T12:55:00Z
6
value 4e-05
scoring_system epss
scoring_elements 0.0015
published_at 2026-04-13T12:55:00Z
7
value 6e-05
scoring_system epss
scoring_elements 0.00351
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-25621
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25621
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/containerd/containerd
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/containerd/containerd
5
reference_url https://github.com/containerd/containerd/blob/main/docs/rootless.md
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T19:34:44Z/
url https://github.com/containerd/containerd/blob/main/docs/rootless.md
6
reference_url https://github.com/containerd/containerd/commit/7c59e8e9e970d38061a77b586b23655c352bfec5
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T19:34:44Z/
url https://github.com/containerd/containerd/commit/7c59e8e9e970d38061a77b586b23655c352bfec5
7
reference_url https://github.com/containerd/containerd/security/advisories/GHSA-pwhc-rpq9-4c8w
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T19:34:44Z/
url https://github.com/containerd/containerd/security/advisories/GHSA-pwhc-rpq9-4c8w
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-25621
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-25621
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120285
reference_id 1120285
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120285
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2413190
reference_id 2413190
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2413190
11
reference_url https://access.redhat.com/errata/RHSA-2025:22955
reference_id RHSA-2025:22955
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22955
12
reference_url https://access.redhat.com/errata/RHSA-2025:23248
reference_id RHSA-2025:23248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23248
13
reference_url https://access.redhat.com/errata/RHSA-2025:23428
reference_id RHSA-2025:23428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23428
14
reference_url https://access.redhat.com/errata/RHSA-2025:23644
reference_id RHSA-2025:23644
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23644
15
reference_url https://access.redhat.com/errata/RHSA-2026:2343
reference_id RHSA-2026:2343
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2343
16
reference_url https://access.redhat.com/errata/RHSA-2026:2456
reference_id RHSA-2026:2456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2456
17
reference_url https://access.redhat.com/errata/RHSA-2026:2900
reference_id RHSA-2026:2900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2900
18
reference_url https://access.redhat.com/errata/RHSA-2026:3122
reference_id RHSA-2026:3122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3122
19
reference_url https://access.redhat.com/errata/RHSA-2026:3713
reference_id RHSA-2026:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3713
20
reference_url https://access.redhat.com/errata/RHSA-2026:5807
reference_id RHSA-2026:5807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5807
21
reference_url https://usn.ubuntu.com/7983-1/
reference_id USN-7983-1
reference_type
scores
url https://usn.ubuntu.com/7983-1/
fixed_packages
0
url pkg:deb/debian/containerd@1.5.8~ds1-3
purl pkg:deb/debian/containerd@1.5.8~ds1-3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/containerd@1.5.8~ds1-3
aliases CVE-2024-25621, GHSA-pwhc-rpq9-4c8w
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f2yv-ut5v-m7ey
1
url VCID-twq1-g136-9kc3
vulnerability_id VCID-twq1-g136-9kc3
summary
containerd has an integer overflow in User ID handling
### Impact
A bug was found in containerd where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user.

### Patches
This bug has been fixed in the following containerd versions: 

* 2.0.4 (Fixed in https://github.com/containerd/containerd/commit/1a43cb6a1035441f9aca8f5666a9b3ef9e70ab20)
* 1.7.27 (Fixed in https://github.com/containerd/containerd/commit/05044ec0a9a75232cad458027ca83437aae3f4da)
* 1.6.38 (Fixed in https://github.com/containerd/containerd/commit/cf158e884cfe4812a6c371b59e4ea9bc4c46e51a)

Users should update to these versions to resolve the issue.

### Workarounds
Ensure that only trusted images are used and that only trusted users have permissions to import images.

### Credits
The containerd project would like to thank [Benjamin Koltermann](https://github.com/p4ck3t0) and [emxll](https://github.com/emxll) for responsibly disclosing this issue in accordance with the [containerd security policy](https://github.com/containerd/project/blob/main/SECURITY.md).

### References
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40635

### For more information

If you have any questions or comments about this advisory:

* Open an issue in [containerd](https://github.com/containerd/containerd/issues/new/choose)
* Email us at [security@containerd.io](mailto:security@containerd.io)

To report a security issue in containerd:
* [Report a new vulnerability](https://github.com/containerd/containerd/security/advisories/new)
* Email us at [security@containerd.io](mailto:security@containerd.io)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40635.json
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40635.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-40635
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02699
published_at 2026-04-24T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02709
published_at 2026-04-21T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02604
published_at 2026-04-02T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02609
published_at 2026-04-12T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02623
published_at 2026-04-11T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02646
published_at 2026-04-09T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02626
published_at 2026-04-08T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02622
published_at 2026-04-07T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02618
published_at 2026-04-04T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02599
published_at 2026-04-18T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02591
published_at 2026-04-16T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.02608
published_at 2026-04-13T12:55:00Z
12
value 0.00062
scoring_system epss
scoring_elements 0.19193
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-40635
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40635
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/containerd/containerd
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/containerd/containerd
5
reference_url https://github.com/containerd/containerd/commit/05044ec0a9a75232cad458027ca83437aae3f4da
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-18T14:17:05Z/
url https://github.com/containerd/containerd/commit/05044ec0a9a75232cad458027ca83437aae3f4da
6
reference_url https://github.com/containerd/containerd/commit/1a43cb6a1035441f9aca8f5666a9b3ef9e70ab20
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-18T14:17:05Z/
url https://github.com/containerd/containerd/commit/1a43cb6a1035441f9aca8f5666a9b3ef9e70ab20
7
reference_url https://github.com/containerd/containerd/commit/cf158e884cfe4812a6c371b59e4ea9bc4c46e51a
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-18T14:17:05Z/
url https://github.com/containerd/containerd/commit/cf158e884cfe4812a6c371b59e4ea9bc4c46e51a
8
reference_url https://github.com/containerd/containerd/security/advisories/GHSA-265r-hfxg-fhmg
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-18T14:17:05Z/
url https://github.com/containerd/containerd/security/advisories/GHSA-265r-hfxg-fhmg
9
reference_url https://lists.debian.org/debian-lts-announce/2025/05/msg00005.html
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2025/05/msg00005.html
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-40635
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-40635
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100806
reference_id 1100806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100806
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2353043
reference_id 2353043
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2353043
13
reference_url https://usn.ubuntu.com/7374-1/
reference_id USN-7374-1
reference_type
scores
url https://usn.ubuntu.com/7374-1/
fixed_packages
0
url pkg:deb/debian/containerd@1.5.8~ds1-3
purl pkg:deb/debian/containerd@1.5.8~ds1-3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/containerd@1.5.8~ds1-3
aliases CVE-2024-40635, GHSA-265r-hfxg-fhmg
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-twq1-g136-9kc3
2
url VCID-xd4a-qav4-uqd1
vulnerability_id VCID-xd4a-qav4-uqd1
summary
containerd CRI server: Host memory exhaustion through Attach goroutine leak
### Impact

A bug was found in containerd's CRI Attach implementation where a user can exhaust memory on the host due to goroutine leaks. 

Repetitive calls of CRI Attach (e.g., [`kubectl attach`](https://kubernetes.io/docs/reference/kubectl/generated/kubectl_attach/)) could increase the memory usage of containerd.

### Patches

This bug has been fixed in the following containerd versions:

* 2.2.0
* 2.1.5
* 2.0.7
* 1.7.29

Users should update to these versions to resolve the issue.

### Workarounds

Set up an admission controller to control accesses to `pods/attach` resources.
e.g., [Validating Admission Policy](https://kubernetes.io/docs/reference/access-authn-authz/validating-admission-policy/).

### Credits

The containerd project would like to thank @Wheat2018 for responsibly disclosing this issue in accordance with the [containerd security policy](https://github.com/containerd/project/blob/main/SECURITY.md).

### References

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64329

### For more information

If you have any questions or comments about this advisory:

* Open an issue in [containerd](https://github.com/containerd/containerd/issues/new/choose)
* Email us at [security@containerd.io](mailto:security@containerd.io)

To report a security issue in containerd:

* [Report a new vulnerability](https://github.com/containerd/containerd/security/advisories/new)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-64329.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-64329.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-64329
reference_id
reference_type
scores
0
value 5e-05
scoring_system epss
scoring_elements 0.00264
published_at 2026-04-08T12:55:00Z
1
value 5e-05
scoring_system epss
scoring_elements 0.00256
published_at 2026-04-16T12:55:00Z
2
value 5e-05
scoring_system epss
scoring_elements 0.00258
published_at 2026-04-13T12:55:00Z
3
value 5e-05
scoring_system epss
scoring_elements 0.00259
published_at 2026-04-12T12:55:00Z
4
value 5e-05
scoring_system epss
scoring_elements 0.00262
published_at 2026-04-11T12:55:00Z
5
value 5e-05
scoring_system epss
scoring_elements 0.00266
published_at 2026-04-07T12:55:00Z
6
value 6e-05
scoring_system epss
scoring_elements 0.00401
published_at 2026-04-21T12:55:00Z
7
value 6e-05
scoring_system epss
scoring_elements 0.00402
published_at 2026-04-26T12:55:00Z
8
value 6e-05
scoring_system epss
scoring_elements 0.00377
published_at 2026-04-18T12:55:00Z
9
value 6e-05
scoring_system epss
scoring_elements 0.004
published_at 2026-04-24T12:55:00Z
10
value 8e-05
scoring_system epss
scoring_elements 0.00673
published_at 2026-04-04T12:55:00Z
11
value 8e-05
scoring_system epss
scoring_elements 0.00681
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-64329
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64329
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/containerd/containerd
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/containerd/containerd
5
reference_url https://github.com/containerd/containerd/commit/083b53cd6f19b5de7717b0ce92c11bdf95e612df
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-07T17:41:50Z/
url https://github.com/containerd/containerd/commit/083b53cd6f19b5de7717b0ce92c11bdf95e612df
6
reference_url https://github.com/containerd/containerd/security/advisories/GHSA-m6hq-p25p-ffr2
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-07T17:41:50Z/
url https://github.com/containerd/containerd/security/advisories/GHSA-m6hq-p25p-ffr2
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-64329
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-64329
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120343
reference_id 1120343
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120343
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2413299
reference_id 2413299
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2413299
10
reference_url https://access.redhat.com/errata/RHSA-2026:2900
reference_id RHSA-2026:2900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2900
11
reference_url https://usn.ubuntu.com/7983-1/
reference_id USN-7983-1
reference_type
scores
url https://usn.ubuntu.com/7983-1/
fixed_packages
0
url pkg:deb/debian/containerd@1.5.8~ds1-3
purl pkg:deb/debian/containerd@1.5.8~ds1-3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/containerd@1.5.8~ds1-3
1
url pkg:deb/debian/containerd@1.6.20~ds1-1%2Bdeb12u3
purl pkg:deb/debian/containerd@1.6.20~ds1-1%2Bdeb12u3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/containerd@1.6.20~ds1-1%252Bdeb12u3
2
url pkg:deb/debian/containerd@1.7.24~ds1-4
purl pkg:deb/debian/containerd@1.7.24~ds1-4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/containerd@1.7.24~ds1-4
aliases CVE-2025-64329, GHSA-m6hq-p25p-ffr2
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xd4a-qav4-uqd1
Fixing_vulnerabilities
0
url VCID-3brf-dmwm-qkgj
vulnerability_id VCID-3brf-dmwm-qkgj
summary
Supplementary groups are not set up properly in github.com/containerd/containerd
### Impact

A bug was found in containerd where supplementary groups are not set up properly inside a container.  If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container.

Downstream applications that use the containerd client library may be affected as well.

### Patches
This bug has been fixed in containerd v1.6.18 and v.1.5.18.  Users should update to these versions and recreate containers to resolve this issue.  Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions.

### Workarounds

Ensure that the `"USER $USERNAME"` Dockerfile instruction is not used.  Instead, set the container entrypoint to a value similar to `ENTRYPOINT ["su", "-", "user"]` to allow `su` to properly set up supplementary groups.

### References

- https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
- Docker/Moby: CVE-2022-36109, fixed in Docker 20.10.18
- CRI-O: CVE-2022-2995, fixed in CRI-O 1.25.0
- Podman: CVE-2022-2989, fixed in Podman 3.0.1 and 4.2.0
- Buildah: CVE-2022-2990, fixed in Buildah 1.27.1

Note that CVE IDs apply to a particular implementation, even if an issue is common.

### For more information

If you have any questions or comments about this advisory:

* Open an issue in [containerd](https://github.com/containerd/containerd/issues/new/choose)
* Email us at [security@containerd.io](mailto:security@containerd.io)

To report a security issue in containerd:
* [Report a new vulnerability](https://github.com/containerd/containerd/security/advisories/new)
* Email us at [security@containerd.io](mailto:security@containerd.io)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25173.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25173.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25173
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05739
published_at 2026-04-02T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05779
published_at 2026-04-04T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06859
published_at 2026-04-21T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06699
published_at 2026-04-18T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06709
published_at 2026-04-16T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.06778
published_at 2026-04-13T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06708
published_at 2026-04-07T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06759
published_at 2026-04-08T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.06784
published_at 2026-04-12T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06791
published_at 2026-04-11T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06887
published_at 2026-04-26T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.06867
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25173
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25173
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25173
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/advisories/GHSA-4wjj-jwc9-2x96
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/
url https://github.com/advisories/GHSA-4wjj-jwc9-2x96
5
reference_url https://github.com/advisories/GHSA-fjm8-m7m6-2fjp
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/
url https://github.com/advisories/GHSA-fjm8-m7m6-2fjp
6
reference_url https://github.com/advisories/GHSA-phjr-8j92-w5v7
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/
url https://github.com/advisories/GHSA-phjr-8j92-w5v7
7
reference_url https://github.com/containerd/containerd
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/containerd/containerd
8
reference_url https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/
url https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a
9
reference_url https://github.com/containerd/containerd/releases/tag/v1.5.18
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/
url https://github.com/containerd/containerd/releases/tag/v1.5.18
10
reference_url https://github.com/containerd/containerd/releases/tag/v1.6.18
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/
url https://github.com/containerd/containerd/releases/tag/v1.6.18
11
reference_url https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/
url https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p
12
reference_url https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/
url https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-25173
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-25173
17
reference_url https://pkg.go.dev/vuln/GO-2023-1574
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://pkg.go.dev/vuln/GO-2023-1574
18
reference_url https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2174485
reference_id 2174485
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2174485
20
reference_url https://security.gentoo.org/glsa/202408-01
reference_id GLSA-202408-01
reference_type
scores
url https://security.gentoo.org/glsa/202408-01
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/
reference_id LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/
22
reference_url https://access.redhat.com/errata/RHSA-2023:1326
reference_id RHSA-2023:1326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1326
23
reference_url https://access.redhat.com/errata/RHSA-2023:1372
reference_id RHSA-2023:1372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1372
24
reference_url https://access.redhat.com/errata/RHSA-2023:2107
reference_id RHSA-2023:2107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2107
25
reference_url https://access.redhat.com/errata/RHSA-2023:3450
reference_id RHSA-2023:3450
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3450
26
reference_url https://access.redhat.com/errata/RHSA-2023:3455
reference_id RHSA-2023:3455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3455
27
reference_url https://access.redhat.com/errata/RHSA-2023:3537
reference_id RHSA-2023:3537
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3537
28
reference_url https://access.redhat.com/errata/RHSA-2023:4025
reference_id RHSA-2023:4025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4025
29
reference_url https://access.redhat.com/errata/RHSA-2023:4226
reference_id RHSA-2023:4226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4226
30
reference_url https://access.redhat.com/errata/RHSA-2023:4488
reference_id RHSA-2023:4488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4488
31
reference_url https://access.redhat.com/errata/RHSA-2023:4671
reference_id RHSA-2023:4671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4671
32
reference_url https://access.redhat.com/errata/RHSA-2023:5006
reference_id RHSA-2023:5006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5006
33
reference_url https://access.redhat.com/errata/RHSA-2023:5314
reference_id RHSA-2023:5314
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5314
34
reference_url https://access.redhat.com/errata/RHSA-2023:6473
reference_id RHSA-2023:6473
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6473
35
reference_url https://access.redhat.com/errata/RHSA-2023:6474
reference_id RHSA-2023:6474
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6474
36
reference_url https://access.redhat.com/errata/RHSA-2023:6817
reference_id RHSA-2023:6817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6817
37
reference_url https://access.redhat.com/errata/RHSA-2023:6939
reference_id RHSA-2023:6939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6939
38
reference_url https://usn.ubuntu.com/6202-1/
reference_id USN-6202-1
reference_type
scores
url https://usn.ubuntu.com/6202-1/
39
reference_url https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
reference_id vulnerability-in-linux-containers-investigation-and-mitigation
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/
url https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
40
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE/
reference_id XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE/
41
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/
reference_id ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/
fixed_packages
0
url pkg:deb/debian/containerd@1.4.13~ds1-1~deb11u4
purl pkg:deb/debian/containerd@1.4.13~ds1-1~deb11u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-f2yv-ut5v-m7ey
1
vulnerability VCID-twq1-g136-9kc3
2
vulnerability VCID-xd4a-qav4-uqd1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/containerd@1.4.13~ds1-1~deb11u4
aliases CVE-2023-25173, GHSA-hmfx-3pcx-653p
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3brf-dmwm-qkgj
1
url VCID-tc5s-4nx2-y7d9
vulnerability_id VCID-tc5s-4nx2-y7d9
summary Multiple vulnerabilities have been found in containerd, the worst of which could result in privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23471
reference_id
reference_type
scores
0
value 0.00245
scoring_system epss
scoring_elements 0.47854
published_at 2026-04-18T12:55:00Z
1
value 0.00245
scoring_system epss
scoring_elements 0.47799
published_at 2026-04-26T12:55:00Z
2
value 0.00245
scoring_system epss
scoring_elements 0.47778
published_at 2026-04-02T12:55:00Z
3
value 0.00245
scoring_system epss
scoring_elements 0.4779
published_at 2026-04-24T12:55:00Z
4
value 0.00245
scoring_system epss
scoring_elements 0.47798
published_at 2026-04-12T12:55:00Z
5
value 0.00245
scoring_system epss
scoring_elements 0.47746
published_at 2026-04-07T12:55:00Z
6
value 0.00245
scoring_system epss
scoring_elements 0.47801
published_at 2026-04-08T12:55:00Z
7
value 0.00245
scoring_system epss
scoring_elements 0.47797
published_at 2026-04-09T12:55:00Z
8
value 0.00245
scoring_system epss
scoring_elements 0.47821
published_at 2026-04-11T12:55:00Z
9
value 0.00245
scoring_system epss
scoring_elements 0.47807
published_at 2026-04-21T12:55:00Z
10
value 0.00245
scoring_system epss
scoring_elements 0.47861
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23471
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23471
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23471
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/containerd/containerd
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/containerd/containerd
4
reference_url https://github.com/containerd/containerd/commit/241563be06a3de8b6a849414c4e805b68d3bb295
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/containerd/containerd/commit/241563be06a3de8b6a849414c4e805b68d3bb295
5
reference_url https://github.com/containerd/containerd/commit/a05d175400b1145e5e6a735a6710579d181e7fb0
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:52:53Z/
url https://github.com/containerd/containerd/commit/a05d175400b1145e5e6a735a6710579d181e7fb0
6
reference_url https://github.com/containerd/containerd/releases/tag/v1.5.16
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/containerd/containerd/releases/tag/v1.5.16
7
reference_url https://github.com/containerd/containerd/releases/tag/v1.6.12
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/containerd/containerd/releases/tag/v1.6.12
8
reference_url https://github.com/containerd/containerd/security/advisories/GHSA-2qjp-425j-52j9
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:52:53Z/
url https://github.com/containerd/containerd/security/advisories/GHSA-2qjp-425j-52j9
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-23471
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-23471
10
reference_url https://security.gentoo.org/glsa/202401-31
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:52:53Z/
url https://security.gentoo.org/glsa/202401-31
11
reference_url https://usn.ubuntu.com/5776-1/
reference_id USN-5776-1
reference_type
scores
url https://usn.ubuntu.com/5776-1/
fixed_packages
0
url pkg:deb/debian/containerd@1.4.13~ds1-1~deb11u4
purl pkg:deb/debian/containerd@1.4.13~ds1-1~deb11u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-f2yv-ut5v-m7ey
1
vulnerability VCID-twq1-g136-9kc3
2
vulnerability VCID-xd4a-qav4-uqd1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/containerd@1.4.13~ds1-1~deb11u4
aliases CVE-2022-23471, GHSA-2qjp-425j-52j9
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tc5s-4nx2-y7d9
2
url VCID-yyye-gaug-8uh2
vulnerability_id VCID-yyye-gaug-8uh2
summary
OCI image importer memory exhaustion in github.com/containerd/containerd
### Impact
When importing an OCI image, there was no limit on the number of bytes read for certain files. A maliciously crafted image with a large file where a limit was not applied could cause a denial of service.

### Patches

This bug has been fixed in containerd 1.6.18 and 1.5.18.  Users should update to these versions to resolve the issue.

### Workarounds

Ensure that only trusted images are used and that only trusted users have permissions to import images. 

### Credits

The containerd project would like to thank [David Korczynski](https://github.com/DavidKorczynski) and [Adam Korczynski](https://github.com/AdamKorcz) of ADA Logics for responsibly disclosing this issue in accordance with the [containerd security policy](https://github.com/containerd/project/blob/main/SECURITY.md) during a security fuzzing audit sponsored by CNCF.

### For more information

If you have any questions or comments about this advisory:

* Open an issue in [containerd](https://github.com/containerd/containerd/issues/new/choose)
* Email us at [security@containerd.io](mailto:security@containerd.io)

To report a security issue in containerd:
* [Report a new vulnerability](https://github.com/containerd/containerd/security/advisories/new)
* Email us at [security@containerd.io](mailto:security@containerd.io)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25153.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25153.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25153
reference_id
reference_type
scores
0
value 0.0019
scoring_system epss
scoring_elements 0.40909
published_at 2026-04-02T12:55:00Z
1
value 0.0019
scoring_system epss
scoring_elements 0.40938
published_at 2026-04-11T12:55:00Z
2
value 0.0019
scoring_system epss
scoring_elements 0.40921
published_at 2026-04-09T12:55:00Z
3
value 0.0019
scoring_system epss
scoring_elements 0.40914
published_at 2026-04-08T12:55:00Z
4
value 0.0019
scoring_system epss
scoring_elements 0.40865
published_at 2026-04-07T12:55:00Z
5
value 0.0019
scoring_system epss
scoring_elements 0.40936
published_at 2026-04-04T12:55:00Z
6
value 0.0019
scoring_system epss
scoring_elements 0.40894
published_at 2026-04-18T12:55:00Z
7
value 0.0019
scoring_system epss
scoring_elements 0.40925
published_at 2026-04-16T12:55:00Z
8
value 0.0019
scoring_system epss
scoring_elements 0.40883
published_at 2026-04-13T12:55:00Z
9
value 0.0019
scoring_system epss
scoring_elements 0.40903
published_at 2026-04-12T12:55:00Z
10
value 0.00209
scoring_system epss
scoring_elements 0.43242
published_at 2026-04-24T12:55:00Z
11
value 0.00209
scoring_system epss
scoring_elements 0.43309
published_at 2026-04-21T12:55:00Z
12
value 0.00209
scoring_system epss
scoring_elements 0.43245
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25153
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25153
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/containerd/containerd
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/containerd/containerd
5
reference_url https://github.com/containerd/containerd/commit/0c314901076a74a7b797a545d2f462285fdbb8c4
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T20:57:30Z/
url https://github.com/containerd/containerd/commit/0c314901076a74a7b797a545d2f462285fdbb8c4
6
reference_url https://github.com/containerd/containerd/releases/tag/v1.5.18
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T20:57:30Z/
url https://github.com/containerd/containerd/releases/tag/v1.5.18
7
reference_url https://github.com/containerd/containerd/releases/tag/v1.6.18
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T20:57:30Z/
url https://github.com/containerd/containerd/releases/tag/v1.6.18
8
reference_url https://github.com/containerd/containerd/security/advisories/GHSA-259w-8hf6-59c2
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T20:57:30Z/
url https://github.com/containerd/containerd/security/advisories/GHSA-259w-8hf6-59c2
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-25153
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-25153
10
reference_url https://pkg.go.dev/vuln/GO-2023-1573
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://pkg.go.dev/vuln/GO-2023-1573
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2174473
reference_id 2174473
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2174473
12
reference_url https://security.gentoo.org/glsa/202408-01
reference_id GLSA-202408-01
reference_type
scores
url https://security.gentoo.org/glsa/202408-01
13
reference_url https://access.redhat.com/errata/RHSA-2023:6817
reference_id RHSA-2023:6817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6817
14
reference_url https://usn.ubuntu.com/6202-1/
reference_id USN-6202-1
reference_type
scores
url https://usn.ubuntu.com/6202-1/
fixed_packages
0
url pkg:deb/debian/containerd@1.4.13~ds1-1~deb11u4
purl pkg:deb/debian/containerd@1.4.13~ds1-1~deb11u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-f2yv-ut5v-m7ey
1
vulnerability VCID-twq1-g136-9kc3
2
vulnerability VCID-xd4a-qav4-uqd1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/containerd@1.4.13~ds1-1~deb11u4
aliases CVE-2023-25153, GHSA-259w-8hf6-59c2
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yyye-gaug-8uh2
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/containerd@1.4.13~ds1-1~deb11u4