Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-fhyv-xgpf-kfdf
Summary
Podman Creates Temporary File with Insecure Permissions
A flaw was found in Podman. In a Containerfile or Podman, data written to RUN --mount=type=bind mounts during the podman build is not discarded. This issue can lead to files created within the container appearing in the temporary build context directory on the host, leaving the created files accessible.
Aliases
0
alias CVE-2025-4953
1
alias GHSA-m68q-4hqr-mc6f
Fixed_packages
0
url pkg:deb/debian/podman@5.3.2%2Bds1-1?distro=trixie
purl pkg:deb/debian/podman@5.3.2%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/podman@5.3.2%252Bds1-1%3Fdistro=trixie
1
url pkg:deb/debian/podman@5.4.2%2Bds1-2?distro=trixie
purl pkg:deb/debian/podman@5.4.2%2Bds1-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24jj-m523-3bdr
1
vulnerability VCID-6h1q-xus4-4qcs
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/podman@5.4.2%252Bds1-2%3Fdistro=trixie
2
url pkg:deb/debian/podman@5.8.1%2Bds1-2?distro=trixie
purl pkg:deb/debian/podman@5.8.1%2Bds1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/podman@5.8.1%252Bds1-2%3Fdistro=trixie
3
url pkg:deb/debian/podman@5.8.1%2Bds1-3?distro=trixie
purl pkg:deb/debian/podman@5.8.1%2Bds1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/podman@5.8.1%252Bds1-3%3Fdistro=trixie
4
url pkg:deb/debian/podman@5.8.2%2Bds1-1?distro=trixie
purl pkg:deb/debian/podman@5.8.2%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/podman@5.8.2%252Bds1-1%3Fdistro=trixie
Affected_packages
0
url pkg:rpm/redhat/buildah@1:1.29.1-5.rhaos4.13?arch=el9
purl pkg:rpm/redhat/buildah@1:1.29.1-5.rhaos4.13?arch=el9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-fhyv-xgpf-kfdf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@1:1.29.1-5.rhaos4.13%3Farch=el9
1
url pkg:rpm/redhat/buildah@1:1.29.5-1.rhaos4.13?arch=el8
purl pkg:rpm/redhat/buildah@1:1.29.5-1.rhaos4.13?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-fhyv-xgpf-kfdf
1
vulnerability VCID-xe2z-2g23-skhf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@1:1.29.5-1.rhaos4.13%3Farch=el8
2
url pkg:rpm/redhat/conmon@3:2.1.7-5.rhaos4.13?arch=el8
purl pkg:rpm/redhat/conmon@3:2.1.7-5.rhaos4.13?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-fhyv-xgpf-kfdf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/conmon@3:2.1.7-5.rhaos4.13%3Farch=el8
3
url pkg:rpm/redhat/containernetworking-plugins@1:1.4.0-5.rhaos4.13?arch=el8
purl pkg:rpm/redhat/containernetworking-plugins@1:1.4.0-5.rhaos4.13?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-fhyv-xgpf-kfdf
1
vulnerability VCID-hfxt-nnd8-dfc8
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/containernetworking-plugins@1:1.4.0-5.rhaos4.13%3Farch=el8
4
url pkg:rpm/redhat/cri-o@1.26.5-26.rhaos4.13.giteb3d487?arch=el8
purl pkg:rpm/redhat/cri-o@1.26.5-26.rhaos4.13.giteb3d487?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-fhyv-xgpf-kfdf
1
vulnerability VCID-p3we-3y2n-vugu
2
vulnerability VCID-zcxt-ccb2-eufc
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cri-o@1.26.5-26.rhaos4.13.giteb3d487%3Farch=el8
5
url pkg:rpm/redhat/cri-tools@1.26.0-7?arch=el8
purl pkg:rpm/redhat/cri-tools@1.26.0-7?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-fhyv-xgpf-kfdf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cri-tools@1.26.0-7%3Farch=el8
6
url pkg:rpm/redhat/haproxy@2.2.24-5.rhaos4.13?arch=el8
purl pkg:rpm/redhat/haproxy@2.2.24-5.rhaos4.13?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-fhyv-xgpf-kfdf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/haproxy@2.2.24-5.rhaos4.13%3Farch=el8
7
url pkg:rpm/redhat/ignition@2.15.0-10.rhaos4.13?arch=el9
purl pkg:rpm/redhat/ignition@2.15.0-10.rhaos4.13?arch=el9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-fhyv-xgpf-kfdf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ignition@2.15.0-10.rhaos4.13%3Farch=el9
8
url pkg:rpm/redhat/kernel@5.14.0-284.109.1?arch=el9_2
purl pkg:rpm/redhat/kernel@5.14.0-284.109.1?arch=el9_2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6n89-yvxb-pqfg
1
vulnerability VCID-fhyv-xgpf-kfdf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@5.14.0-284.109.1%3Farch=el9_2
9
url pkg:rpm/redhat/kernel-rt@5.14.0-284.109.1.rt14.394?arch=el9_2
purl pkg:rpm/redhat/kernel-rt@5.14.0-284.109.1.rt14.394?arch=el9_2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6n89-yvxb-pqfg
1
vulnerability VCID-fhyv-xgpf-kfdf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@5.14.0-284.109.1.rt14.394%3Farch=el9_2
10
url pkg:rpm/redhat/openshift@4.13.0-202410181847.p0.g53fd427.assembly.stream?arch=el8
purl pkg:rpm/redhat/openshift@4.13.0-202410181847.p0.g53fd427.assembly.stream?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-fhyv-xgpf-kfdf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift@4.13.0-202410181847.p0.g53fd427.assembly.stream%3Farch=el8
11
url pkg:rpm/redhat/openshift4-aws-iso@4.13.0-202410181847.p0.gd2acdd5.assembly.stream?arch=el8
purl pkg:rpm/redhat/openshift4-aws-iso@4.13.0-202410181847.p0.gd2acdd5.assembly.stream?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-fhyv-xgpf-kfdf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift4-aws-iso@4.13.0-202410181847.p0.gd2acdd5.assembly.stream%3Farch=el8
12
url pkg:rpm/redhat/openshift-ansible@4.13.0-202410181847.p0.g1397e80.assembly.stream?arch=el8
purl pkg:rpm/redhat/openshift-ansible@4.13.0-202410181847.p0.g1397e80.assembly.stream?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-fhyv-xgpf-kfdf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift-ansible@4.13.0-202410181847.p0.g1397e80.assembly.stream%3Farch=el8
13
url pkg:rpm/redhat/openshift-clients@4.13.0-202410181847.p0.gd192e90.assembly.stream?arch=el8
purl pkg:rpm/redhat/openshift-clients@4.13.0-202410181847.p0.gd192e90.assembly.stream?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-fhyv-xgpf-kfdf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift-clients@4.13.0-202410181847.p0.gd192e90.assembly.stream%3Farch=el8
14
url pkg:rpm/redhat/openshift-kuryr@4.13.0-202410181847.p0.g36754b7.assembly.stream?arch=el8
purl pkg:rpm/redhat/openshift-kuryr@4.13.0-202410181847.p0.g36754b7.assembly.stream?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-fhyv-xgpf-kfdf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift-kuryr@4.13.0-202410181847.p0.g36754b7.assembly.stream%3Farch=el8
15
url pkg:rpm/redhat/podman@3:4.2.0-15.rhaos4.12?arch=el9
purl pkg:rpm/redhat/podman@3:4.2.0-15.rhaos4.12?arch=el9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6h1q-xus4-4qcs
1
vulnerability VCID-fhyv-xgpf-kfdf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@3:4.2.0-15.rhaos4.12%3Farch=el9
16
url pkg:rpm/redhat/podman@3:4.4.1-15.rhaos4.13?arch=el8
purl pkg:rpm/redhat/podman@3:4.4.1-15.rhaos4.13?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-fhyv-xgpf-kfdf
1
vulnerability VCID-hfxt-nnd8-dfc8
2
vulnerability VCID-hs7s-yxfz-mbf1
3
vulnerability VCID-j9nr-4d4t-j3e1
4
vulnerability VCID-rdqf-wp1t-j7b5
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@3:4.4.1-15.rhaos4.13%3Farch=el8
17
url pkg:rpm/redhat/podman@3:4.4.1-16.rhaos4.13?arch=el8
purl pkg:rpm/redhat/podman@3:4.4.1-16.rhaos4.13?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-fhyv-xgpf-kfdf
1
vulnerability VCID-xe2z-2g23-skhf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@3:4.4.1-16.rhaos4.13%3Farch=el8
18
url pkg:rpm/redhat/podman@4:4.9.4-16.rhaos4.16?arch=el8
purl pkg:rpm/redhat/podman@4:4.9.4-16.rhaos4.16?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6h1q-xus4-4qcs
1
vulnerability VCID-fhyv-xgpf-kfdf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@4:4.9.4-16.rhaos4.16%3Farch=el8
19
url pkg:rpm/redhat/podman@5:5.2.2-2.rhaos4.18?arch=el8
purl pkg:rpm/redhat/podman@5:5.2.2-2.rhaos4.18?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-fhyv-xgpf-kfdf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@5:5.2.2-2.rhaos4.18%3Farch=el8
20
url pkg:rpm/redhat/runc@4:1.1.14-2.rhaos4.13?arch=el8
purl pkg:rpm/redhat/runc@4:1.1.14-2.rhaos4.13?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-fhyv-xgpf-kfdf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.1.14-2.rhaos4.13%3Farch=el8
21
url pkg:rpm/redhat/skopeo@2:1.11.3-4.rhaos4.13?arch=el8
purl pkg:rpm/redhat/skopeo@2:1.11.3-4.rhaos4.13?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-fhyv-xgpf-kfdf
1
vulnerability VCID-hfxt-nnd8-dfc8
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/skopeo@2:1.11.3-4.rhaos4.13%3Farch=el8
References
0
reference_url https://access.redhat.com/errata/RHSA-2024:8690
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-16T16:15:17Z/
url https://access.redhat.com/errata/RHSA-2024:8690
1
reference_url https://access.redhat.com/errata/RHSA-2025:15904
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-16T16:15:17Z/
url https://access.redhat.com/errata/RHSA-2025:15904
2
reference_url https://access.redhat.com/errata/RHSA-2025:16724
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-16T16:15:17Z/
url https://access.redhat.com/errata/RHSA-2025:16724
3
reference_url https://access.redhat.com/errata/RHSA-2025:16729
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-16T16:15:17Z/
url https://access.redhat.com/errata/RHSA-2025:16729
4
reference_url https://access.redhat.com/errata/RHSA-2025:17669
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-16T16:15:17Z/
url https://access.redhat.com/errata/RHSA-2025:17669
5
reference_url https://access.redhat.com/errata/RHSA-2025:22265
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-16T16:15:17Z/
url https://access.redhat.com/errata/RHSA-2025:22265
6
reference_url https://access.redhat.com/errata/RHSA-2025:22275
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-16T16:15:17Z/
url https://access.redhat.com/errata/RHSA-2025:22275
7
reference_url https://access.redhat.com/errata/RHSA-2025:22695
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-16T16:15:17Z/
url https://access.redhat.com/errata/RHSA-2025:22695
8
reference_url https://access.redhat.com/errata/RHSA-2025:22724
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-16T16:15:17Z/
url https://access.redhat.com/errata/RHSA-2025:22724
9
reference_url https://access.redhat.com/errata/RHSA-2025:22732
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-16T16:15:17Z/
url https://access.redhat.com/errata/RHSA-2025:22732
10
reference_url https://access.redhat.com/errata/RHSA-2025:23113
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-16T16:15:17Z/
url https://access.redhat.com/errata/RHSA-2025:23113
11
reference_url https://access.redhat.com/errata/RHSA-2025:2703
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-16T16:15:17Z/
url https://access.redhat.com/errata/RHSA-2025:2703
12
reference_url https://access.redhat.com/errata/RHSA-2026:0316
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-16T16:15:17Z/
url https://access.redhat.com/errata/RHSA-2026:0316
13
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4953.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4953.json
14
reference_url https://access.redhat.com/security/cve/CVE-2025-4953
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-16T16:15:17Z/
url https://access.redhat.com/security/cve/CVE-2025-4953
15
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-4953
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07438
published_at 2026-04-11T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07452
published_at 2026-04-09T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07428
published_at 2026-04-08T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07373
published_at 2026-04-07T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.0739
published_at 2026-04-04T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07347
published_at 2026-04-02T12:55:00Z
6
value 0.0003
scoring_system epss
scoring_elements 0.08669
published_at 2026-04-21T12:55:00Z
7
value 0.0003
scoring_system epss
scoring_elements 0.08653
published_at 2026-04-12T12:55:00Z
8
value 0.0003
scoring_system epss
scoring_elements 0.0864
published_at 2026-04-13T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.0853
published_at 2026-04-16T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08517
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-4953
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2367235
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-16T16:15:17Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2367235
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4953
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://github.com/containers/podman
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/containers/podman
20
reference_url https://github.com/containers/podman/pull/25173
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-16T16:15:17Z/
url https://github.com/containers/podman/pull/25173
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-4953
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-4953
22
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117966
reference_id 1117966
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117966
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el8
reference_id cpe:/a:redhat:openshift:4.12::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el8
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el9
reference_id cpe:/a:redhat:openshift:4.12::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el9
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el8
reference_id cpe:/a:redhat:openshift:4.13::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el8
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el9
reference_id cpe:/a:redhat:openshift:4.13::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el9
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el9
reference_id cpe:/a:redhat:openshift:4.14::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el9
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.15::el9
reference_id cpe:/a:redhat:openshift:4.15::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.15::el9
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.16::el8
reference_id cpe:/a:redhat:openshift:4.16::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.16::el8
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.16::el9
reference_id cpe:/a:redhat:openshift:4.16::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.16::el9
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.17::el9
reference_id cpe:/a:redhat:openshift:4.17::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.17::el9
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.18::el8
reference_id cpe:/a:redhat:openshift:4.18::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.18::el8
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.18::el9
reference_id cpe:/a:redhat:openshift:4.18::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.18::el9
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
Weaknesses
0
cwe_id 378
name Creation of Temporary File With Insecure Permissions
description Opening temporary files without appropriate measures or controls can leave the file, its contents and any function that it impacts vulnerable to attack.
Exploits
Severity_range_score7.0 - 8.9
Exploitability0.5
Weighted_severity8.0
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-fhyv-xgpf-kfdf