Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/930221?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/930221?format=api", "purl": "pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie", "type": "deb", "namespace": "debian", "name": "lxc", "version": "1:4.0.6-2+deb11u2", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "1:5.0.2-1", "latest_non_vulnerable_version": "1:6.0.6-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48760?format=api", "vulnerability_id": "VCID-1rds-zc87-auf6", "summary": "A vulnerability has been found in LXC which may allow for arbitrary\n file access (read-only).", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6556", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18319", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18417", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18487", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18632", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18687", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18402", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18483", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18536", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18538", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.1849", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18439", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18383", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18395", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6556" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6556", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6556" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=905586", "reference_id": "905586", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=905586" }, { "reference_url": "https://security.archlinux.org/AVG-754", "reference_id": "AVG-754", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-754" }, { "reference_url": "https://security.gentoo.org/glsa/201808-02", "reference_id": "GLSA-201808-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-02" }, { "reference_url": "https://usn.ubuntu.com/3730-1/", "reference_id": "USN-3730-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3730-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1077452?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930230?format=api", "purl": "pkg:deb/debian/lxc@1:2.0.9-6.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:2.0.9-6.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930221?format=api", "purl": "pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:4.0.6-2%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930219?format=api", "purl": "pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:5.0.2-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930223?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.4-4%252Bdeb13u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930222?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-6556" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1rds-zc87-auf6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80616?format=api", "vulnerability_id": "VCID-2esq-3t19-akam", "summary": "security update", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1331", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14978", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.15019", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.15097", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14901", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14989", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.15041", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.15006", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14968", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.1491", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14809", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14816", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14872", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1331" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1331", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1331" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1334", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1334" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=793298", "reference_id": "793298", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=793298" }, { "reference_url": "https://usn.ubuntu.com/2675-1/", "reference_id": "USN-2675-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2675-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1077452?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930224?format=api", "purl": "pkg:deb/debian/lxc@1:1.0.7-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:1.0.7-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930221?format=api", "purl": "pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:4.0.6-2%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930219?format=api", "purl": "pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:5.0.2-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930223?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.4-4%252Bdeb13u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930222?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2015-1331" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2esq-3t19-akam" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/10297?format=api", "vulnerability_id": "VCID-7juj-78y7-g7b6", "summary": "Containment Errors (Container Errors)\nrunc allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to `/proc/self/exe`.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00044.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00044.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00074.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00074.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00091.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00091.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00060.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00060.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00011.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00011.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00007.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00029.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00029.html" }, { "reference_url": "http://packetstormsecurity.com/files/163339/Docker-Container-Escape.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/163339/Docker-Container-Escape.html" }, { "reference_url": "http://packetstormsecurity.com/files/165197/Docker-runc-Command-Execution-Proof-Of-Concept.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/165197/Docker-runc-Command-Execution-Proof-Of-Concept.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5736.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5736.json" }, { "reference_url": "https://access.redhat.com/security/cve/cve-2019-5736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/security/cve/cve-2019-5736" }, { "reference_url": "https://access.redhat.com/security/vulnerabilities/runcescape", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/security/vulnerabilities/runcescape" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-5736", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.55296", "scoring_system": "epss", "scoring_elements": "0.98055", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.55296", "scoring_system": "epss", "scoring_elements": "0.98049", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.55296", "scoring_system": "epss", "scoring_elements": "0.98076", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.55296", "scoring_system": "epss", "scoring_elements": "0.98057", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.59178", "scoring_system": "epss", "scoring_elements": "0.98241", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.59178", "scoring_system": "epss", "scoring_elements": "0.98226", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.59178", "scoring_system": "epss", "scoring_elements": "0.98231", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.59178", "scoring_system": "epss", "scoring_elements": "0.98234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.59178", "scoring_system": "epss", "scoring_elements": "0.98239", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-5736" }, { "reference_url": "https://aws.amazon.com/security/security-bulletins/AWS-2019-002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://aws.amazon.com/security/security-bulletins/AWS-2019-002/" }, { "reference_url": "https://azure.microsoft.com/en-us/updates/cve-2019-5736-and-runc-vulnerability/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://azure.microsoft.com/en-us/updates/cve-2019-5736-and-runc-vulnerability/" }, { "reference_url": "https://azure.microsoft.com/en-us/updates/iot-edge-fix-cve-2019-5736/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://azure.microsoft.com/en-us/updates/iot-edge-fix-cve-2019-5736/" }, { "reference_url": "https://blog.dragonsector.pl/2019/02/cve-2019-5736-escape-from-docker-and.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://blog.dragonsector.pl/2019/02/cve-2019-5736-escape-from-docker-and.html" }, { "reference_url": "https://brauner.github.io/2019/02/12/privileged-containers.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://brauner.github.io/2019/02/12/privileged-containers.html" }, { "reference_url": "https://bugzilla.suse.com/show_bug.cgi?id=1121967", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1121967" }, { "reference_url": "https://cloud.google.com/kubernetes-engine/docs/security-bulletins#february-11-2019-runc", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cloud.google.com/kubernetes-engine/docs/security-bulletins#february-11-2019-runc" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5736" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/docker/docker-ce/releases/tag/v18.09.2", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/docker/docker-ce/releases/tag/v18.09.2" }, { "reference_url": "https://github.com/Frichetten/CVE-2019-5736-PoC", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/Frichetten/CVE-2019-5736-PoC" }, { "reference_url": "https://github.com/opencontainers/runc/commit/0a8e4117e7f715d5fbeef398405813ce8e88558b", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/opencontainers/runc/commit/0a8e4117e7f715d5fbeef398405813ce8e88558b" }, { "reference_url": "https://github.com/opencontainers/runc/commit/6635b4f0c6af3810594d2770f662f34ddc15b40d", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/opencontainers/runc/commit/6635b4f0c6af3810594d2770f662f34ddc15b40d" }, { "reference_url": "https://github.com/q3k/cve-2019-5736-poc", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/q3k/cve-2019-5736-poc" }, { "reference_url": "https://github.com/rancher/runc-cve", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/rancher/runc-cve" }, { "reference_url": "https://kubernetes.io/blog/2019/02/11/runc-and-cve-2019-5736/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://kubernetes.io/blog/2019/02/11/runc-and-cve-2019-5736/" }, { "reference_url": "https://lists.apache.org/thread.html/24e54e3c6b2259e3903b6b8fe26896ac649c481ea99c5739468c92a3%40%3Cdev.dlab.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/24e54e3c6b2259e3903b6b8fe26896ac649c481ea99c5739468c92a3%40%3Cdev.dlab.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/a258757af84c5074dc7bf932622020fd4f60cef65a84290380386706%40%3Cuser.mesos.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/a258757af84c5074dc7bf932622020fd4f60cef65a84290380386706%40%3Cuser.mesos.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/a585f64d14c31ab393b90c5f17e41d9765a1a17eec63856ce750af46%40%3Cdev.dlab.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/a585f64d14c31ab393b90c5f17e41d9765a1a17eec63856ce750af46%40%3Cdev.dlab.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/acacf018c12636e41667e94ac0a1e9244e887eef2debdd474640aa6e%40%3Cdev.dlab.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/acacf018c12636e41667e94ac0a1e9244e887eef2debdd474640aa6e%40%3Cdev.dlab.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/b162dd624dc088cd634292f0402282a1d1d0ce853baeae8205bc033c%40%3Cdev.mesos.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/b162dd624dc088cd634292f0402282a1d1d0ce853baeae8205bc033c%40%3Cdev.mesos.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/rc494623986d76593873ce5a40dd69cb3629400d10750d5d7e96b8587%40%3Cdev.dlab.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/rc494623986d76593873ce5a40dd69cb3629400d10750d5d7e96b8587%40%3Cdev.dlab.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DLC52IOJN6IQJWJ6CUI6AIUP6GVVG2QP/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DLC52IOJN6IQJWJ6CUI6AIUP6GVVG2QP/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EGZKRCKI3Y7FMADO2MENMT4TU24QGHFR/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EGZKRCKI3Y7FMADO2MENMT4TU24QGHFR/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SWFJGIPYAAAMVSWWI3QWYXGA3ZBU2H4W/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SWFJGIPYAAAMVSWWI3QWYXGA3ZBU2H4W/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6A4OSFM5GGOWW4ECELV5OHX2XRAUSPH/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6A4OSFM5GGOWW4ECELV5OHX2XRAUSPH/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190307-0008/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190307-0008/" }, { "reference_url": "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03410944", "reference_id": "", "reference_type": "", "scores": [], "url": "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03410944" }, { "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03913en_us", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03913en_us" }, { "reference_url": "https://support.mesosphere.com/s/article/Known-Issue-Container-Runtime-Vulnerability-MSPH-2019-0003", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.mesosphere.com/s/article/Known-Issue-Container-Runtime-Vulnerability-MSPH-2019-0003" }, { "reference_url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190215-runc", "reference_id": "", "reference_type": "", "scores": [], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190215-runc" }, { "reference_url": "https://www.exploit-db.com/exploits/46359/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/46359/" }, { "reference_url": "https://www.exploit-db.com/exploits/46369/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/46369/" }, { "reference_url": "https://www.openwall.com/lists/oss-security/2019/02/11/2", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.openwall.com/lists/oss-security/2019/02/11/2" }, { "reference_url": "https://www.synology.com/security/advisory/Synology_SA_19_06", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.synology.com/security/advisory/Synology_SA_19_06" }, { "reference_url": "https://www.twistlock.com/2019/02/11/how-to-mitigate-cve-2019-5736-in-runc-and-docker/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.twistlock.com/2019/02/11/how-to-mitigate-cve-2019-5736-in-runc-and-docker/" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/03/23/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/03/23/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/06/28/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/06/28/2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/07/06/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/07/06/3" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/07/06/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/07/06/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/10/24/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/10/24/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/10/29/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/10/29/3" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/01/31/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2024/01/31/6" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/02/01/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2024/02/01/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/02/02/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2024/02/02/3" }, { "reference_url": "http://www.securityfocus.com/bid/106976", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/106976" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664908", "reference_id": "1664908", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664908" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922050", "reference_id": "922050", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922050" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922169", "reference_id": "922169", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922169" }, { "reference_url": "https://security.archlinux.org/ASA-201902-20", "reference_id": "ASA-201902-20", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201902-20" }, { "reference_url": "https://security.archlinux.org/ASA-201902-6", "reference_id": "ASA-201902-6", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201902-6" }, { "reference_url": "https://security.archlinux.org/AVG-878", "reference_id": "AVG-878", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-878" }, { "reference_url": "https://security.archlinux.org/AVG-880", "reference_id": "AVG-880", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-880" }, { "reference_url": "https://security.archlinux.org/AVG-892", "reference_id": "AVG-892", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-892" }, { "reference_url": "https://security.archlinux.org/AVG-893", "reference_id": "AVG-893", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-893" }, { "reference_url": "https://security.archlinux.org/AVG-895", "reference_id": "AVG-895", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-895" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:mesos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:mesos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:mesos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d2iq:kubernetes_engine:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:d2iq:kubernetes_engine:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d2iq:kubernetes_engine:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:docker:docker:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:docker:docker:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:docker:docker:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:kubernetes_engine:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:kubernetes_engine:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:kubernetes_engine:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:onesphere:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:onesphere:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:onesphere:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxcontainers:lxc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:linuxcontainers:lxc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxcontainers:lxc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:linuxfoundation:runc:1.0.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:linuxfoundation:runc:1.0.0:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:linuxfoundation:runc:1.0.0:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:linuxfoundation:runc:1.0.0:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:linuxfoundation:runc:1.0.0:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:linuxfoundation:runc:1.0.0:rc6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microfocus:service_management_automation:2018.02:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:microfocus:service_management_automation:2018.02:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microfocus:service_management_automation:2018.02:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microfocus:service_management_automation:2018.05:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:microfocus:service_management_automation:2018.05:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microfocus:service_management_automation:2018.05:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microfocus:service_management_automation:2018.08:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:microfocus:service_management_automation:2018.08:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microfocus:service_management_automation:2018.08:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microfocus:service_management_automation:2018.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:microfocus:service_management_automation:2018.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microfocus:service_management_automation:2018.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:container_development_kit:3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:container_development_kit:3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:container_development_kit:3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:openshift:3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:openshift:3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:openshift:3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:openshift:3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:d2iq:dc\\/os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:d2iq:dc\\/os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:d2iq:dc\\/os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://github.com/feexd/pocs/tree/a5aac58e0935a505c034b5f9e6cf35c1fc67471d/CVE-2019-5736", "reference_id": "CVE-2019-5736", "reference_type": "exploit", "scores": [], "url": "https://github.com/feexd/pocs/tree/a5aac58e0935a505c034b5f9e6cf35c1fc67471d/CVE-2019-5736" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/46359.md", "reference_id": "CVE-2019-5736", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/46359.md" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/46369.md", "reference_id": "CVE-2019-5736", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/46369.md" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5736", "reference_id": "CVE-2019-5736", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5736" }, { "reference_url": "https://www.openwall.com/lists/oss-security/2019/02/13/3", "reference_id": "CVE-2019-5736", "reference_type": "exploit", "scores": [], "url": "https://www.openwall.com/lists/oss-security/2019/02/13/3" }, { "reference_url": "https://security.gentoo.org/glsa/202003-21", "reference_id": "GLSA-202003-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:0303", "reference_id": "RHSA-2019:0303", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:0303" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:0304", "reference_id": "RHSA-2019:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:0401", "reference_id": "RHSA-2019:0401", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:0401" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:0408", "reference_id": "RHSA-2019:0408", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:0408" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:0975", "reference_id": "RHSA-2019:0975", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:0975" }, { "reference_url": "https://usn.ubuntu.com/4048-1/", "reference_id": "USN-4048-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4048-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1077452?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930231?format=api", "purl": "pkg:deb/debian/lxc@1:3.1.0%2Breally3.0.3-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:3.1.0%252Breally3.0.3-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930221?format=api", "purl": "pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:4.0.6-2%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930219?format=api", "purl": "pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:5.0.2-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930223?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.4-4%252Bdeb13u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930222?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-5736" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7juj-78y7-g7b6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80617?format=api", "vulnerability_id": "VCID-7qzu-162d-7ug4", "summary": "security update", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1334", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27956", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.28029", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.28072", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27866", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27933", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27974", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27932", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27873", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27882", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27863", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.2782", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27736", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1334" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1331", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1331" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1334", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1334" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=793298", "reference_id": "793298", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=793298" }, { "reference_url": "https://usn.ubuntu.com/2675-1/", "reference_id": "USN-2675-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2675-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1077452?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930224?format=api", "purl": "pkg:deb/debian/lxc@1:1.0.7-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:1.0.7-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930221?format=api", "purl": "pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:4.0.6-2%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930219?format=api", "purl": "pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:5.0.2-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930223?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.4-4%252Bdeb13u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930222?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2015-1334" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7qzu-162d-7ug4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/45196?format=api", "vulnerability_id": "VCID-brf5-pqx1-13bu", "summary": "A vulnerability in LXC may lead to an unauthorized security bypass.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10124", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51154", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.5109", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51143", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51167", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51124", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51179", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51175", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51219", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51197", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51183", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51222", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51229", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51208", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10124" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/201711-09", "reference_id": "GLSA-201711-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201711-09" }, { "reference_url": "https://usn.ubuntu.com/3375-1/", "reference_id": "USN-3375-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3375-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1077452?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930226?format=api", "purl": "pkg:deb/debian/lxc@1:2.0.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:2.0.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930221?format=api", "purl": "pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:4.0.6-2%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930219?format=api", "purl": "pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:5.0.2-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930223?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.4-4%252Bdeb13u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930222?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-10124" ], "risk_score": 1.1, "exploitability": "0.5", "weighted_severity": "2.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-brf5-pqx1-13bu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86429?format=api", "vulnerability_id": "VCID-hdgf-23he-vkb6", "summary": "lxc: sshd template allow privilege escalation on host", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6441.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6441.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6441", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10327", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10177", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10297", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10364", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10265", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10338", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10404", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10432", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10393", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10371", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10242", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10213", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10346", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6441" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6441", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6441" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1045988", "reference_id": "1045988", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1045988" }, { "reference_url": "https://usn.ubuntu.com/2104-1/", "reference_id": "USN-2104-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2104-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1077452?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930220?format=api", "purl": "pkg:deb/debian/lxc@1.0.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1.0.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930221?format=api", "purl": "pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:4.0.6-2%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930219?format=api", "purl": "pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:5.0.2-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930223?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.4-4%252Bdeb13u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930222?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-6441" ], "risk_score": 1.7, "exploitability": "0.5", "weighted_severity": "3.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hdgf-23he-vkb6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80618?format=api", "vulnerability_id": "VCID-mac4-jq4n-c3hm", "summary": "security update", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1335", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29633", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.297", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.2975", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.2957", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29632", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.2967", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29672", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29628", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29577", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29596", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29525", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29409", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1335" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1335", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1335" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800471", "reference_id": "800471", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800471" }, { "reference_url": "https://usn.ubuntu.com/2753-1/", "reference_id": "USN-2753-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2753-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1077452?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930225?format=api", "purl": "pkg:deb/debian/lxc@1:1.0.8-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:1.0.8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930221?format=api", "purl": "pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:4.0.6-2%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930219?format=api", "purl": "pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:5.0.2-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930223?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.4-4%252Bdeb13u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930222?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2015-1335" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mac4-jq4n-c3hm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95326?format=api", "vulnerability_id": "VCID-xq22-fmtf-8yhs", "summary": "lxc-user-nic in lxc through 5.0.1 is installed setuid root, and may allow local users to infer whether any file exists, even within a protected directory tree, because \"Failed to open\" often indicates that a file does not exist, whereas \"does not refer to a network namespace path\" often indicates that a file exists. NOTE: this is different from CVE-2018-6556 because the CVE-2018-6556 fix design was based on the premise that \"we will report back to the user that the open() failed but the user has no way of knowing why it failed\"; however, in many realistic cases, there are no plausible reasons for failing except that the file does not exist.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47952", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01699", "scoring_system": "epss", "scoring_elements": "0.82243", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01699", "scoring_system": "epss", "scoring_elements": "0.82228", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01699", "scoring_system": "epss", "scoring_elements": "0.82277", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01699", "scoring_system": "epss", "scoring_elements": "0.8227", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01699", "scoring_system": "epss", "scoring_elements": "0.82248", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01699", "scoring_system": "epss", "scoring_elements": "0.82322", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01699", "scoring_system": "epss", "scoring_elements": "0.8232", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01699", "scoring_system": "epss", "scoring_elements": "0.82285", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01699", "scoring_system": "epss", "scoring_elements": "0.82291", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01699", "scoring_system": "epss", "scoring_elements": "0.82297", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02316", "scoring_system": "epss", "scoring_elements": "0.84832", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47952" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47952", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47952" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1783591/comments/45", "reference_id": "45", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-10T19:15:58Z/" } ], "url": "https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1783591/comments/45" }, { "reference_url": "https://github.com/MaherAzzouzi/CVE-2022-47952", "reference_id": "CVE-2022-47952", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-10T19:15:58Z/" } ], "url": "https://github.com/MaherAzzouzi/CVE-2022-47952" }, { "reference_url": "https://github.com/lxc/lxc/blob/0b83d71c2c8f3bac9503f894cd84584f79258bb3/lxc.spec.in#L274", "reference_id": "lxc.spec.in#L274", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-10T19:15:58Z/" } ], "url": "https://github.com/lxc/lxc/blob/0b83d71c2c8f3bac9503f894cd84584f79258bb3/lxc.spec.in#L274" }, { "reference_url": "https://github.com/lxc/lxc/blob/0b83d71c2c8f3bac9503f894cd84584f79258bb3/src/lxc/cmd/lxc_user_nic.c#L1085-L1104", "reference_id": "lxc_user_nic.c#L1085-L1104", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-10T19:15:58Z/" } ], "url": "https://github.com/lxc/lxc/blob/0b83d71c2c8f3bac9503f894cd84584f79258bb3/src/lxc/cmd/lxc_user_nic.c#L1085-L1104" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00025.html", "reference_id": "msg00025.html", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-10T19:15:58Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00025.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1077452?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930221?format=api", "purl": "pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:4.0.6-2%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930232?format=api", "purl": "pkg:deb/debian/lxc@1:5.0.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:5.0.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930219?format=api", "purl": "pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:5.0.2-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930223?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.4-4%252Bdeb13u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930222?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-47952" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xq22-fmtf-8yhs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93195?format=api", "vulnerability_id": "VCID-xx5x-hgur-xbbj", "summary": "In LXC 2.0, many template scripts download code over cleartext HTTP, and omit a digital-signature check, before running it to bootstrap containers.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18641", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64667", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00569", "scoring_system": "epss", "scoring_elements": "0.68503", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00569", "scoring_system": "epss", "scoring_elements": "0.68521", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00569", "scoring_system": "epss", "scoring_elements": "0.68498", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00569", "scoring_system": "epss", "scoring_elements": "0.68549", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00569", "scoring_system": "epss", "scoring_elements": "0.68567", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00569", "scoring_system": "epss", "scoring_elements": "0.68485", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00569", "scoring_system": "epss", "scoring_elements": "0.68581", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00569", "scoring_system": "epss", "scoring_elements": "0.6855", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00569", "scoring_system": "epss", "scoring_elements": "0.6859", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00569", "scoring_system": "epss", "scoring_elements": "0.68602", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00569", "scoring_system": "epss", "scoring_elements": "0.68579", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00569", "scoring_system": "epss", "scoring_elements": "0.68593", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18641" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18641", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18641" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988730", "reference_id": "988730", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988730" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1077452?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930228?format=api", "purl": "pkg:deb/debian/lxc@1:3.0.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:3.0.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930221?format=api", "purl": "pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:4.0.6-2%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930219?format=api", "purl": "pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:5.0.2-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930223?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.4-4%252Bdeb13u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930222?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-18641" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xx5x-hgur-xbbj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93237?format=api", "vulnerability_id": "VCID-xz1y-a2ay-quc1", "summary": "lxc-user-nic in Linux Containers (LXC) allows local users with a lxc-usernet allocation to create network interfaces on the host and choose the name of those interfaces by leveraging lack of netns ownership check.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5985", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25449", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25623", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25693", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25734", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25503", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25576", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25624", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25634", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25594", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25536", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25541", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25525", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25495", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5985" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5985", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5985" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857295", "reference_id": "857295", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857295" }, { "reference_url": "https://security.archlinux.org/ASA-201705-17", "reference_id": "ASA-201705-17", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201705-17" }, { "reference_url": "https://security.archlinux.org/AVG-204", "reference_id": "AVG-204", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-204" }, { "reference_url": "https://usn.ubuntu.com/3224-1/", "reference_id": "USN-3224-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3224-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1077452?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930229?format=api", "purl": "pkg:deb/debian/lxc@1:2.0.7-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:2.0.7-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930221?format=api", "purl": "pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:4.0.6-2%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930219?format=api", "purl": "pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:5.0.2-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930223?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.4-4%252Bdeb13u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930222?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-5985" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xz1y-a2ay-quc1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92976?format=api", "vulnerability_id": "VCID-z74k-px1a-wqa6", "summary": "lxc-attach in LXC before 1.0.9 and 2.x before 2.0.6 allows an attacker inside of an unprivileged container to use an inherited file descriptor, of the host's /proc, to access the rest of the host's filesystem via the openat() family of syscalls.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8649", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02154", "scoring_system": "epss", "scoring_elements": "0.84309", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02154", "scoring_system": "epss", "scoring_elements": "0.84281", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02154", "scoring_system": "epss", "scoring_elements": "0.84284", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02154", "scoring_system": "epss", "scoring_elements": "0.84188", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02154", "scoring_system": "epss", "scoring_elements": "0.84201", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02154", "scoring_system": "epss", "scoring_elements": "0.84219", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02154", "scoring_system": "epss", "scoring_elements": "0.8422", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02154", "scoring_system": "epss", "scoring_elements": "0.84242", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02154", "scoring_system": "epss", "scoring_elements": "0.84249", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02154", "scoring_system": "epss", "scoring_elements": "0.84266", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02154", "scoring_system": "epss", "scoring_elements": "0.84261", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02154", "scoring_system": "epss", "scoring_elements": "0.84258", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02154", "scoring_system": "epss", "scoring_elements": "0.84279", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8649" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845465", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845465" }, { "reference_url": "https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1639345", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1639345" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1398242", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1398242" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8649", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8649" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:S/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/lxc/lxc/commit/81f466d05f2a89cb4f122ef7f593ff3f279b165c", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/lxc/lxc/commit/81f466d05f2a89cb4f122ef7f593ff3f279b165c" }, { "reference_url": "https://security-tracker.debian.org/tracker/CVE-2016-8649", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security-tracker.debian.org/tracker/CVE-2016-8649" }, { "reference_url": "http://www.securityfocus.com/bid/94498", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/94498" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxcontainers:lxc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:linuxcontainers:lxc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxcontainers:lxc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8649", "reference_id": "CVE-2016-8649", "reference_type": "", "scores": [ { "value": "9.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:C/I:C/A:C" }, { "value": "9.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8649" }, { "reference_url": "https://usn.ubuntu.com/3136-1/", "reference_id": "USN-3136-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3136-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1077452?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930227?format=api", "purl": "pkg:deb/debian/lxc@1:2.0.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:2.0.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930221?format=api", "purl": "pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:4.0.6-2%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930219?format=api", "purl": "pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:5.0.2-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930223?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.4-4%252Bdeb13u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930222?format=api", "purl": "pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-8649" ], "risk_score": 4.1, "exploitability": "0.5", "weighted_severity": "8.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z74k-px1a-wqa6" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:4.0.6-2%252Bdeb11u2%3Fdistro=trixie" }