Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/docker@25.0.2-r0?arch=armv7&distroversion=v3.18&reponame=community
Typeapk
Namespacealpine
Namedocker
Version25.0.2-r0
Qualifiers
arch armv7
distroversion v3.18
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1sky-21r5-3qcu
vulnerability_id VCID-1sky-21r5-3qcu
summary
Moby's external DNS requests from 'internal' networks could lead to data exfiltration
Moby is an open source container framework originally developed by Docker Inc. as Docker. It is a key component of Docker Engine, Docker Desktop, and other distributions of container tooling or runtimes. As a batteries-included container runtime, Moby comes with a built-in networking implementation that enables communication between containers, and between containers and external resources.

Moby's networking implementation allows for creating and using many networks, each with their own subnet and gateway. This feature is frequently referred to as custom networks, as each network can have a different driver, set of parameters, and thus behaviors. When creating a network, the `--internal` flag is used to designate a network as _internal_. The `internal` attribute in a docker-compose.yml file may also be used to mark a network _internal_, and other API clients may specify the `internal` parameter as well.

When containers with networking are created, they are assigned unique network interfaces and IP addresses (typically from a non-routable [RFC 1918](https://datatracker.ietf.org/doc/html/rfc1918) subnet). The root network namespace (hereafter referred to as the 'host') serves as a router for non-internal networks, with a gateway IP that provides SNAT/DNAT to/from container IPs.

Containers on an _internal_ network may communicate between each other, but are precluded from communicating with any networks the host has access to (LAN or WAN) as no default route is configured, and firewall rules are set up to drop all outgoing traffic. Communication with the gateway IP address (and thus appropriately configured host services) is possible, and the host may communicate with any container IP directly.

In addition to configuring the Linux kernel's various networking features to enable container networking, `dockerd` directly provides some services to container networks. Principal among these is serving as a resolver, enabling service discovery (looking up other containers on the network by name), and resolution of names from an upstream resolver.

When a DNS request for a name that does not correspond to a container is received, the request is forwarded to the configured upstream resolver (by default, the host's configured resolver). This request is made from the container network namespace: the level of access and routing of traffic is the same as if the request was made by the container itself.

As a consequence of this design, containers solely attached to _internal_ network(s) will be unable to resolve names using the upstream resolver, as the container itself is unable to communicate with that nameserver. Only the names of containers also attached to the internal network are able to be resolved.

Many systems will run a local forwarding DNS resolver, typically present on a loopback address (`127.0.0.0/8`), such as systemd-resolved or dnsmasq. Common loopback address examples include `127.0.0.1` or `127.0.0.53`. As the host and any containers have separate loopback devices, a consequence of the design described above is that containers are unable to resolve names from the host's configured resolver, as they cannot reach these addresses on the host loopback device.

To bridge this gap, and to allow containers to properly resolve names even when a local forwarding resolver is used on a loopback address, `dockerd` will detect this scenario and instead forward DNS requests from the host/root network namespace. The loopback resolver will then forward the requests to its configured upstream resolvers, as expected.

## Impact

Because `dockerd` will forward DNS requests to the host loopback device, bypassing the container network namespace's normal routing semantics entirely, _internal_ networks can unexpectedly forward DNS requests to an external nameserver.

By registering a domain for which they control the authoritative nameservers, an attacker could arrange for a compromised container to exfiltrate data by encoding it in DNS queries that will eventually be answered by their nameservers. For example, if the domain `evil.example` was registered, the authoritative nameserver(s) for that domain could (eventually and indirectly) receive a request for `this-is-a-secret.evil.example`.

Docker Desktop is not affected, as Docker Desktop always runs an internal resolver on a RFC 1918 address.

## Patches

Moby releases 26.0.0-rc3, 25.0.5 (released) and 23.0.11 (to be released) are patched to prevent forwarding DNS requests from internal networks.

## Workarounds

-   Run containers intended to be solely attached to _internal_ networks with a custom upstream address (`--dns` argument to `docker run`, or API equivalent), which will force all upstream DNS queries to be resolved from the container network namespace.

## Background

- yair zak originally reported this issue to the Docker security team.
-  PR <https://github.com/moby/moby/pull/46609> was opened in public to fix this issue, as it was not originally considered to have a security implication.
- [The official documentation](https://docs.docker.com/network/drivers/ipvlan/#:~:text=If%20the%20parent,the%20network%20completely) claims that "the `--internal` flag that will completely isolate containers on a network from any communications external to that network," which necessitated this advisory and CVE.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29018.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29018.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-29018
reference_id
reference_type
scores
0
value 0.00264
scoring_system epss
scoring_elements 0.49702
published_at 2026-04-07T12:55:00Z
1
value 0.00264
scoring_system epss
scoring_elements 0.4975
published_at 2026-04-04T12:55:00Z
2
value 0.00264
scoring_system epss
scoring_elements 0.49723
published_at 2026-04-02T12:55:00Z
3
value 0.00357
scoring_system epss
scoring_elements 0.58027
published_at 2026-04-18T12:55:00Z
4
value 0.00357
scoring_system epss
scoring_elements 0.58021
published_at 2026-04-08T12:55:00Z
5
value 0.00357
scoring_system epss
scoring_elements 0.58023
published_at 2026-04-09T12:55:00Z
6
value 0.00357
scoring_system epss
scoring_elements 0.5804
published_at 2026-04-11T12:55:00Z
7
value 0.00357
scoring_system epss
scoring_elements 0.58018
published_at 2026-04-12T12:55:00Z
8
value 0.00357
scoring_system epss
scoring_elements 0.57998
published_at 2026-04-13T12:55:00Z
9
value 0.00357
scoring_system epss
scoring_elements 0.58028
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-29018
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29018
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/moby/moby
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/moby/moby
5
reference_url https://github.com/moby/moby/pull/46609
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T19:09:14Z/
url https://github.com/moby/moby/pull/46609
6
reference_url https://github.com/moby/moby/security/advisories/GHSA-mq39-4gv4-mvpx
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T19:09:14Z/
url https://github.com/moby/moby/security/advisories/GHSA-mq39-4gv4-mvpx
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068460
reference_id 1068460
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068460
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270591
reference_id 2270591
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270591
9
reference_url https://usn.ubuntu.com/7161-1/
reference_id USN-7161-1
reference_type
scores
url https://usn.ubuntu.com/7161-1/
10
reference_url https://usn.ubuntu.com/7161-2/
reference_id USN-7161-2
reference_type
scores
url https://usn.ubuntu.com/7161-2/
fixed_packages
0
url pkg:apk/alpine/docker@25.0.2-r0?arch=armv7&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/docker@25.0.2-r0?arch=armv7&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@25.0.2-r0%3Farch=armv7&distroversion=v3.18&reponame=community
aliases CVE-2024-29018, GHSA-mq39-4gv4-mvpx
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1sky-21r5-3qcu
1
url VCID-9j8p-hqfn-q7bj
vulnerability_id VCID-9j8p-hqfn-q7bj
summary
BuildKit vulnerable to possible host system access from mount stub cleaner
### Impact
A malicious BuildKit frontend or Dockerfile using `RUN --mount` could trick the feature that removes empty files created for the mountpoints into removing a file outside the container, from the host system.

### Patches
The issue has been fixed in v0.12.5

### Workarounds
Avoid using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing `RUN --mount` feature.

### References
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23652.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23652.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23652
reference_id
reference_type
scores
0
value 0.05701
scoring_system epss
scoring_elements 0.9043
published_at 2026-04-18T12:55:00Z
1
value 0.05701
scoring_system epss
scoring_elements 0.90422
published_at 2026-04-12T12:55:00Z
2
value 0.05701
scoring_system epss
scoring_elements 0.90423
published_at 2026-04-11T12:55:00Z
3
value 0.05701
scoring_system epss
scoring_elements 0.90415
published_at 2026-04-13T12:55:00Z
4
value 0.05701
scoring_system epss
scoring_elements 0.90394
published_at 2026-04-07T12:55:00Z
5
value 0.05701
scoring_system epss
scoring_elements 0.9039
published_at 2026-04-04T12:55:00Z
6
value 0.05701
scoring_system epss
scoring_elements 0.90408
published_at 2026-04-08T12:55:00Z
7
value 0.05701
scoring_system epss
scoring_elements 0.90378
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23652
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/moby/buildkit
reference_id
reference_type
scores
0
value 10.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/moby/buildkit
4
reference_url https://github.com/moby/buildkit/pull/4603
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H
1
value 10.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-01T16:13:41Z/
url https://github.com/moby/buildkit/pull/4603
5
reference_url https://github.com/moby/buildkit/releases/tag/v0.12.5
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H
1
value 10.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-01T16:13:41Z/
url https://github.com/moby/buildkit/releases/tag/v0.12.5
6
reference_url https://github.com/moby/buildkit/security/advisories/GHSA-4v98-7qmw-rqr8
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H
1
value 10.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-01T16:13:41Z/
url https://github.com/moby/buildkit/security/advisories/GHSA-4v98-7qmw-rqr8
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-23652
reference_id
reference_type
scores
0
value 10.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-23652
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2262225
reference_id 2262225
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2262225
9
reference_url https://security.gentoo.org/glsa/202407-12
reference_id GLSA-202407-12
reference_type
scores
url https://security.gentoo.org/glsa/202407-12
10
reference_url https://security.gentoo.org/glsa/202407-25
reference_id GLSA-202407-25
reference_type
scores
url https://security.gentoo.org/glsa/202407-25
11
reference_url https://security.gentoo.org/glsa/202409-29
reference_id GLSA-202409-29
reference_type
scores
url https://security.gentoo.org/glsa/202409-29
12
reference_url https://usn.ubuntu.com/7474-1/
reference_id USN-7474-1
reference_type
scores
url https://usn.ubuntu.com/7474-1/
fixed_packages
0
url pkg:apk/alpine/docker@25.0.2-r0?arch=armv7&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/docker@25.0.2-r0?arch=armv7&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@25.0.2-r0%3Farch=armv7&distroversion=v3.18&reponame=community
aliases CVE-2024-23652, GHSA-4v98-7qmw-rqr8
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9j8p-hqfn-q7bj
2
url VCID-ba18-6srf-ufbu
vulnerability_id VCID-ba18-6srf-ufbu
summary
BuildKit vulnerable to possible race condition with accessing subpaths from cache mounts
### Impact
Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container.

### Patches
The issue has been fixed in v0.12.5

### Workarounds
Avoid using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with `--mount=type=cache,source=...` options.

### References
https://www.openwall.com/lists/oss-security/2019/05/28/1
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23651.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23651.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23651
reference_id
reference_type
scores
0
value 0.00548
scoring_system epss
scoring_elements 0.67942
published_at 2026-04-18T12:55:00Z
1
value 0.00548
scoring_system epss
scoring_elements 0.67929
published_at 2026-04-16T12:55:00Z
2
value 0.00548
scoring_system epss
scoring_elements 0.67891
published_at 2026-04-13T12:55:00Z
3
value 0.00548
scoring_system epss
scoring_elements 0.67853
published_at 2026-04-07T12:55:00Z
4
value 0.00548
scoring_system epss
scoring_elements 0.67872
published_at 2026-04-04T12:55:00Z
5
value 0.00548
scoring_system epss
scoring_elements 0.67903
published_at 2026-04-08T12:55:00Z
6
value 0.00548
scoring_system epss
scoring_elements 0.67917
published_at 2026-04-09T12:55:00Z
7
value 0.00548
scoring_system epss
scoring_elements 0.67927
published_at 2026-04-12T12:55:00Z
8
value 0.00548
scoring_system epss
scoring_elements 0.67941
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23651
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/moby/buildkit
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/moby/buildkit
4
reference_url https://github.com/moby/buildkit/pull/4604
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T15:46:26Z/
url https://github.com/moby/buildkit/pull/4604
5
reference_url https://github.com/moby/buildkit/releases/tag/v0.12.5
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T15:46:26Z/
url https://github.com/moby/buildkit/releases/tag/v0.12.5
6
reference_url https://github.com/moby/buildkit/security/advisories/GHSA-m3r6-h7wv-7xxv
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T15:46:26Z/
url https://github.com/moby/buildkit/security/advisories/GHSA-m3r6-h7wv-7xxv
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-23651
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-23651
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2262224
reference_id 2262224
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2262224
9
reference_url https://security.gentoo.org/glsa/202407-12
reference_id GLSA-202407-12
reference_type
scores
url https://security.gentoo.org/glsa/202407-12
10
reference_url https://security.gentoo.org/glsa/202407-25
reference_id GLSA-202407-25
reference_type
scores
url https://security.gentoo.org/glsa/202407-25
11
reference_url https://security.gentoo.org/glsa/202409-29
reference_id GLSA-202409-29
reference_type
scores
url https://security.gentoo.org/glsa/202409-29
12
reference_url https://usn.ubuntu.com/7474-1/
reference_id USN-7474-1
reference_type
scores
url https://usn.ubuntu.com/7474-1/
fixed_packages
0
url pkg:apk/alpine/docker@25.0.2-r0?arch=armv7&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/docker@25.0.2-r0?arch=armv7&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@25.0.2-r0%3Farch=armv7&distroversion=v3.18&reponame=community
aliases CVE-2024-23651, GHSA-m3r6-h7wv-7xxv
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ba18-6srf-ufbu
3
url VCID-dmsf-7cxm-xff5
vulnerability_id VCID-dmsf-7cxm-xff5
summary
Buildkit's interactive containers API does not validate entitlements check
### Impact
In addition to running containers as build steps, BuildKit also provides APIs for running interactive containers based on built images. It was possible to use these APIs to ask BuildKit to run a container with elevated privileges. Normally, running such containers is only allowed if special `security.insecure` entitlement is enabled both by buildkitd configuration and allowed by the user initializing the build request.

### Patches
The issue has been fixed in v0.12.5 .

### Workarounds
Avoid using BuildKit frontends from untrusted sources. A frontend image is usually specified as the `#syntax` line on your Dockerfile, or with `--frontend` flag when using `buildctl build` command.

### References
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23653.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23653.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23653
reference_id
reference_type
scores
0
value 0.10301
scoring_system epss
scoring_elements 0.93197
published_at 2026-04-18T12:55:00Z
1
value 0.10301
scoring_system epss
scoring_elements 0.93156
published_at 2026-04-02T12:55:00Z
2
value 0.10301
scoring_system epss
scoring_elements 0.9316
published_at 2026-04-04T12:55:00Z
3
value 0.10301
scoring_system epss
scoring_elements 0.93158
published_at 2026-04-07T12:55:00Z
4
value 0.10301
scoring_system epss
scoring_elements 0.93167
published_at 2026-04-08T12:55:00Z
5
value 0.10301
scoring_system epss
scoring_elements 0.93171
published_at 2026-04-09T12:55:00Z
6
value 0.10301
scoring_system epss
scoring_elements 0.93177
published_at 2026-04-11T12:55:00Z
7
value 0.10301
scoring_system epss
scoring_elements 0.93175
published_at 2026-04-12T12:55:00Z
8
value 0.10301
scoring_system epss
scoring_elements 0.93176
published_at 2026-04-13T12:55:00Z
9
value 0.10301
scoring_system epss
scoring_elements 0.93192
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23653
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/moby/buildkit
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/moby/buildkit
4
reference_url https://github.com/moby/buildkit/commit/5026d95aa3336e97cfe46e3764f52d08bac7a10e
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/moby/buildkit/commit/5026d95aa3336e97cfe46e3764f52d08bac7a10e
5
reference_url https://github.com/moby/buildkit/commit/92cc595cfb12891d4b3ae476e067c74250e4b71e
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/moby/buildkit/commit/92cc595cfb12891d4b3ae476e067c74250e4b71e
6
reference_url https://github.com/moby/buildkit/pull/4602
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-23T18:03:21Z/
url https://github.com/moby/buildkit/pull/4602
7
reference_url https://github.com/moby/buildkit/releases/tag/v0.12.5
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-23T18:03:21Z/
url https://github.com/moby/buildkit/releases/tag/v0.12.5
8
reference_url https://github.com/moby/buildkit/security/advisories/GHSA-wr6v-9f75-vh2g
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-23T18:03:21Z/
url https://github.com/moby/buildkit/security/advisories/GHSA-wr6v-9f75-vh2g
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-23653
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-23653
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2262226
reference_id 2262226
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2262226
11
reference_url https://security.gentoo.org/glsa/202407-12
reference_id GLSA-202407-12
reference_type
scores
url https://security.gentoo.org/glsa/202407-12
12
reference_url https://security.gentoo.org/glsa/202407-25
reference_id GLSA-202407-25
reference_type
scores
url https://security.gentoo.org/glsa/202407-25
13
reference_url https://security.gentoo.org/glsa/202409-29
reference_id GLSA-202409-29
reference_type
scores
url https://security.gentoo.org/glsa/202409-29
fixed_packages
0
url pkg:apk/alpine/docker@25.0.2-r0?arch=armv7&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/docker@25.0.2-r0?arch=armv7&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@25.0.2-r0%3Farch=armv7&distroversion=v3.18&reponame=community
aliases CVE-2024-23653, GHSA-wr6v-9f75-vh2g
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dmsf-7cxm-xff5
4
url VCID-f5eu-ram7-v3fr
vulnerability_id VCID-f5eu-ram7-v3fr
summary
BuildKit vulnerable to possible panic when incorrect parameters sent from frontend
### Impact
A malicious BuildKit client or frontend could craft a request that could lead to BuildKit daemon crashing with a panic.

### Patches
The issue has been fixed in v0.12.5

### Workarounds
Avoid using BuildKit frontends from untrusted sources. A frontend image is usually specified as the `#syntax` line on your Dockerfile, or with `--frontend` flag when using `buildctl build` command. 

### References
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23650.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23650.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23650
reference_id
reference_type
scores
0
value 0.0011
scoring_system epss
scoring_elements 0.29301
published_at 2026-04-16T12:55:00Z
1
value 0.0011
scoring_system epss
scoring_elements 0.29275
published_at 2026-04-18T12:55:00Z
2
value 0.0011
scoring_system epss
scoring_elements 0.29328
published_at 2026-04-12T12:55:00Z
3
value 0.0011
scoring_system epss
scoring_elements 0.29375
published_at 2026-04-11T12:55:00Z
4
value 0.0011
scoring_system epss
scoring_elements 0.29371
published_at 2026-04-09T12:55:00Z
5
value 0.0011
scoring_system epss
scoring_elements 0.29266
published_at 2026-04-07T12:55:00Z
6
value 0.0011
scoring_system epss
scoring_elements 0.29454
published_at 2026-04-04T12:55:00Z
7
value 0.0011
scoring_system epss
scoring_elements 0.29405
published_at 2026-04-02T12:55:00Z
8
value 0.0011
scoring_system epss
scoring_elements 0.29331
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23650
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/moby/buildkit
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/moby/buildkit
4
reference_url https://github.com/moby/buildkit/commit/481d9c45f473c58537f39694a38d7995cc656987
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/moby/buildkit/commit/481d9c45f473c58537f39694a38d7995cc656987
5
reference_url https://github.com/moby/buildkit/commit/7718bd5c3dc8fc5cd246a30cc41766e7a53c043c
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/moby/buildkit/commit/7718bd5c3dc8fc5cd246a30cc41766e7a53c043c
6
reference_url https://github.com/moby/buildkit/commit/83edaef59d545b93e2750f1f85675a3764593fee
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/moby/buildkit/commit/83edaef59d545b93e2750f1f85675a3764593fee
7
reference_url https://github.com/moby/buildkit/commit/96663dd35bf3787d7efb1ee7fd9ac7fe533582ae
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/moby/buildkit/commit/96663dd35bf3787d7efb1ee7fd9ac7fe533582ae
8
reference_url https://github.com/moby/buildkit/commit/e1924dc32da35bfb0bfdbb9d0fc7bca25e552330
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/moby/buildkit/commit/e1924dc32da35bfb0bfdbb9d0fc7bca25e552330
9
reference_url https://github.com/moby/buildkit/pull/4601
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T20:14:10Z/
url https://github.com/moby/buildkit/pull/4601
10
reference_url https://github.com/moby/buildkit/releases/tag/v0.12.5
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T20:14:10Z/
url https://github.com/moby/buildkit/releases/tag/v0.12.5
11
reference_url https://github.com/moby/buildkit/security/advisories/GHSA-9p26-698r-w4hx
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T20:14:10Z/
url https://github.com/moby/buildkit/security/advisories/GHSA-9p26-698r-w4hx
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-23650
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-23650
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2262272
reference_id 2262272
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2262272
14
reference_url https://security.gentoo.org/glsa/202409-29
reference_id GLSA-202409-29
reference_type
scores
url https://security.gentoo.org/glsa/202409-29
15
reference_url https://access.redhat.com/errata/RHSA-2024:2988
reference_id RHSA-2024:2988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2988
fixed_packages
0
url pkg:apk/alpine/docker@25.0.2-r0?arch=armv7&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/docker@25.0.2-r0?arch=armv7&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@25.0.2-r0%3Farch=armv7&distroversion=v3.18&reponame=community
aliases CVE-2024-23650, GHSA-9p26-698r-w4hx
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f5eu-ram7-v3fr
5
url VCID-njcw-wc13-dqcz
vulnerability_id VCID-njcw-wc13-dqcz
summary
Classic builder cache poisoning
The classic builder cache system is prone to cache poisoning if the image is built `FROM scratch`.
Also, changes to some instructions (most important being `HEALTHCHECK` and `ONBUILD`) would not cause a cache miss.


An attacker with the knowledge of the Dockerfile someone is using could poison their cache by making them pull a specially crafted image that would be considered as a valid cache candidate for some build steps.

For example, an attacker could create an image that is considered as a valid cache candidate for:
```
FROM scratch
MAINTAINER Pawel
```

when in fact the malicious image used as a cache would be an image built from a different Dockerfile.

In the second case, the attacker could for example substitute a different `HEALTCHECK` command.


### Impact

23.0+ users are only affected if they explicitly opted out of Buildkit (`DOCKER_BUILDKIT=0` environment variable) or are using the `/build` API endpoint (which uses the classic builder by default).

All users on versions older than 23.0 could be impacted. An example could be a CI with a shared cache, or just a regular Docker user pulling a malicious image due to misspelling/typosquatting.

Image build API endpoint (`/build`) and `ImageBuild` function from `github.com/docker/docker/client` is also affected as it the uses classic builder by default. 


### Patches

Patches are included in Moby releases:

- v25.0.2
- v24.0.9
- v23.0.10

### Workarounds

- Use `--no-cache` or use Buildkit if possible (`DOCKER_BUILDKIT=1`, it's default on 23.0+ assuming that the buildx plugin is installed).
- Use `Version = types.BuilderBuildKit` or `NoCache = true` in `ImageBuildOptions` for `ImageBuild` call.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24557.json
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24557.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-24557
reference_id
reference_type
scores
0
value 0.00083
scoring_system epss
scoring_elements 0.24317
published_at 2026-04-18T12:55:00Z
1
value 0.00083
scoring_system epss
scoring_elements 0.24328
published_at 2026-04-16T12:55:00Z
2
value 0.00083
scoring_system epss
scoring_elements 0.2431
published_at 2026-04-13T12:55:00Z
3
value 0.00083
scoring_system epss
scoring_elements 0.24367
published_at 2026-04-12T12:55:00Z
4
value 0.00083
scoring_system epss
scoring_elements 0.24409
published_at 2026-04-11T12:55:00Z
5
value 0.00083
scoring_system epss
scoring_elements 0.24348
published_at 2026-04-08T12:55:00Z
6
value 0.00083
scoring_system epss
scoring_elements 0.24281
published_at 2026-04-07T12:55:00Z
7
value 0.00083
scoring_system epss
scoring_elements 0.24498
published_at 2026-04-04T12:55:00Z
8
value 0.00083
scoring_system epss
scoring_elements 0.24464
published_at 2026-04-02T12:55:00Z
9
value 0.00083
scoring_system epss
scoring_elements 0.24392
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-24557
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24557
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24557
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/moby/moby
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/moby/moby
5
reference_url https://github.com/moby/moby/commit/3e230cfdcc989dc524882f6579f9e0dac77400ae
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T15:20:50Z/
url https://github.com/moby/moby/commit/3e230cfdcc989dc524882f6579f9e0dac77400ae
6
reference_url https://github.com/moby/moby/commit/fca702de7f71362c8d103073c7e4a1d0a467fadd
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/moby/moby/commit/fca702de7f71362c8d103073c7e4a1d0a467fadd
7
reference_url https://github.com/moby/moby/commit/fce6e0ca9bc000888de3daa157af14fa41fcd0ff
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/moby/moby/commit/fce6e0ca9bc000888de3daa157af14fa41fcd0ff
8
reference_url https://github.com/moby/moby/security/advisories/GHSA-xw73-rw38-6vjc
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T15:20:50Z/
url https://github.com/moby/moby/security/advisories/GHSA-xw73-rw38-6vjc
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-24557
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-24557
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071745
reference_id 1071745
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071745
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2262352
reference_id 2262352
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2262352
12
reference_url https://security.gentoo.org/glsa/202409-29
reference_id GLSA-202409-29
reference_type
scores
url https://security.gentoo.org/glsa/202409-29
13
reference_url https://access.redhat.com/errata/RHSA-2025:11749
reference_id RHSA-2025:11749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:11749
14
reference_url https://access.redhat.com/errata/RHSA-2025:9340
reference_id RHSA-2025:9340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:9340
fixed_packages
0
url pkg:apk/alpine/docker@25.0.2-r0?arch=armv7&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/docker@25.0.2-r0?arch=armv7&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@25.0.2-r0%3Farch=armv7&distroversion=v3.18&reponame=community
aliases CVE-2024-24557, GHSA-xw73-rw38-6vjc
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-njcw-wc13-dqcz
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@25.0.2-r0%3Farch=armv7&distroversion=v3.18&reponame=community