Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-e82r-vc77-f7bz
Summary
Docker Swarm encrypted overlay network with a single endpoint is unauthenticated
[Moby](https://mobyproject.org/) is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as [moby/moby](https://github.com/moby/moby) is commonly referred to as *Docker*.

Swarm Mode, which is compiled in and delivered by default in `dockerd` and is thus present in most major Moby downstreams, is a simple, built-in container orchestrator that is implemented through a combination of [SwarmKit](https://github.com/moby/swarmkit) and supporting network code.

The `overlay` network driver is a core feature of Swarm Mode, providing isolated virtual LANs that allow communication between containers and services across the cluster. This driver is an implementation/user of [VXLAN](https://en.wikipedia.org/wiki/Virtual_Extensible_LAN), which encapsulates link-layer (Ethernet) frames in UDP datagrams that tag the frame with a VXLAN Network ID (VNI) that identifies the originating overlay network. In addition, the overlay network driver supports an optional, off-by-default encrypted mode, which is especially useful when VXLAN packets traverses an untrusted network between nodes.

Encrypted overlay networks function by encapsulating the VXLAN datagrams through the use of the [IPsec Encapsulating Security Payload](https://en.wikipedia.org/wiki/IPsec#Encapsulating_Security_Payload) protocol in [Transport mode](https://en.wikipedia.org/wiki/IPsec#Transport_mode). By deploying IPSec encapsulation, encrypted overlay networks gain the additional properties of source authentication through cryptographic proof, data integrity through check-summing, and confidentiality through encryption.

When setting an endpoint up on an encrypted overlay network, Moby installs three [iptables](https://www.netfilter.org/projects/iptables/index.html) (Linux kernel firewall) rules that enforce both incoming and outgoing IPSec. These rules rely on the `u32` iptables extension provided by the `xt_u32` kernel module to directly filter on a VXLAN packet's VNI field, so that IPSec guarantees can be enforced on encrypted overlay networks without interfering with other overlay networks or other users of VXLAN.

The `overlay` driver dynamically and lazily defines the kernel configuration for the VXLAN network on each node as containers are attached and detached. Routes and encryption parameters are only defined for destination nodes that participate in the network. The iptables rules that prevent encrypted overlay networks from accepting unencrypted packets are not created until a peer is available with which to communicate.

## Impact
Encrypted overlay networks silently accept cleartext VXLAN datagrams that are tagged with the VNI of an encrypted overlay network. As a result, it is possible to inject arbitrary Ethernet frames into the encrypted overlay network by encapsulating them in VXLAN datagrams. The implications of this can be quite dire, and [GHSA-vwm3-crmr-xfxw](https://github.com/moby/moby/security/advisories/GHSA-vwm3-crmr-xfxw) should be referenced for a deeper exploration.

## Patches
Patches are available in Moby releases 23.0.3, and 20.10.24. As Mirantis Container Runtime's 20.10 releases are numbered differently, users of that platform should update to 20.10.16.

## Workarounds
* In multi-node clusters, deploy a global ‘pause’ container for each encrypted overlay network, on every node. For example, use the `registry.k8s.io/pause` image and a `--mode global` service.
* For a single-node cluster, do not use overlay networks of any sort. Bridge networks provide the same connectivity on a single node and have no multi-node features.
The Swarm ingress feature is implemented using an overlay network, but can be disabled by publishing ports in `host` mode instead of `ingress` mode (allowing the use of an external load balancer), and removing the `ingress` network.
* If encrypted overlay networks are in exclusive use, block UDP port 4789 from traffic that has not been validated by IPSec. For example, `iptables -A INPUT -m udp —-dport 4789 -m policy --dir in --pol none -j DROP`.

## Background
* This issue was discovered while characterizing and mitigating [CVE-2023-28840](https://github.com/moby/moby/security/advisories/GHSA-232p-vwff-86mp) and [CVE-2023-28841](https://github.com/moby/moby/security/advisories/GHSA-33pg-m6jh-5237).

## Related
* [CVE-2023-28841: Encrypted overlay network traffic may be unencrypted](https://github.com/moby/moby/security/advisories/GHSA-33pg-m6jh-5237)
* [CVE-2023-28840: Encrypted overlay network may be unauthenticated](https://github.com/moby/moby/security/advisories/GHSA-232p-vwff-86mp)
* [GHSA-vwm3-crmr-xfxw: The Swarm VXLAN port may be exposed to attack due to ambiguous documentation](https://github.com/moby/moby/security/advisories/GHSA-vwm3-crmr-xfxw)
* [GHSA-gvm4-2qqg-m333: Security issues in encrypted overlay networks](https://github.com/moby/libnetwork/security/advisories/GHSA-gvm4-2qqg-m333) (libnetwork)
Aliases
0
alias CVE-2023-28842
1
alias GHSA-6wrf-mxfj-pf5p
Fixed_packages
0
url pkg:apk/alpine/docker@20.10.24-r0?arch=ppc64le&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/docker@20.10.24-r0?arch=ppc64le&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@20.10.24-r0%3Farch=ppc64le&distroversion=v3.17&reponame=community
1
url pkg:apk/alpine/docker@20.10.24-r0?arch=x86&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/docker@20.10.24-r0?arch=x86&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@20.10.24-r0%3Farch=x86&distroversion=v3.17&reponame=community
2
url pkg:apk/alpine/docker@20.10.24-r0?arch=x86_64&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/docker@20.10.24-r0?arch=x86_64&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@20.10.24-r0%3Farch=x86_64&distroversion=v3.17&reponame=community
3
url pkg:apk/alpine/docker@20.10.24-r0?arch=aarch64&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/docker@20.10.24-r0?arch=aarch64&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@20.10.24-r0%3Farch=aarch64&distroversion=v3.17&reponame=community
4
url pkg:apk/alpine/docker@20.10.24-r0?arch=armv7&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/docker@20.10.24-r0?arch=armv7&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@20.10.24-r0%3Farch=armv7&distroversion=v3.17&reponame=community
5
url pkg:apk/alpine/docker@20.10.24-r0?arch=armhf&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/docker@20.10.24-r0?arch=armhf&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@20.10.24-r0%3Farch=armhf&distroversion=v3.17&reponame=community
6
url pkg:apk/alpine/docker@20.10.24-r0?arch=s390x&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/docker@20.10.24-r0?arch=s390x&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@20.10.24-r0%3Farch=s390x&distroversion=v3.17&reponame=community
7
url pkg:apk/alpine/docker@23.0.3-r0?arch=armhf&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=armhf&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=armhf&distroversion=v3.18&reponame=community
8
url pkg:apk/alpine/docker@23.0.3-r0?arch=aarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=aarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=aarch64&distroversion=v3.23&reponame=community
9
url pkg:apk/alpine/docker@23.0.3-r0?arch=loongarch64&distroversion=edge&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=loongarch64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=loongarch64&distroversion=edge&reponame=community
10
url pkg:apk/alpine/docker@23.0.3-r0?arch=x86&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=x86&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=x86&distroversion=v3.23&reponame=community
11
url pkg:apk/alpine/docker@23.0.3-r0?arch=aarch64&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=aarch64&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=aarch64&distroversion=v3.20&reponame=community
12
url pkg:apk/alpine/docker@23.0.3-r0?arch=armhf&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=armhf&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=armhf&distroversion=v3.20&reponame=community
13
url pkg:apk/alpine/docker@23.0.3-r0?arch=s390x&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=s390x&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=s390x&distroversion=v3.20&reponame=community
14
url pkg:apk/alpine/docker@23.0.3-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=x86&distroversion=v3.20&reponame=community
15
url pkg:apk/alpine/docker@23.0.3-r0?arch=riscv64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=riscv64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=riscv64&distroversion=v3.23&reponame=community
16
url pkg:apk/alpine/docker@23.0.3-r0?arch=s390x&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=s390x&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=s390x&distroversion=v3.23&reponame=community
17
url pkg:apk/alpine/docker@23.0.3-r0?arch=x86_64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=x86_64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=x86_64&distroversion=v3.23&reponame=community
18
url pkg:apk/alpine/docker@23.0.3-r0?arch=ppc64le&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=ppc64le&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=ppc64le&distroversion=v3.21&reponame=community
19
url pkg:apk/alpine/docker@23.0.3-r0?arch=x86_64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=x86_64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=x86_64&distroversion=v3.21&reponame=community
20
url pkg:apk/alpine/docker@23.0.3-r0?arch=armv7&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=armv7&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=armv7&distroversion=v3.20&reponame=community
21
url pkg:apk/alpine/docker@23.0.3-r0?arch=ppc64le&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=ppc64le&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=ppc64le&distroversion=v3.20&reponame=community
22
url pkg:apk/alpine/docker@23.0.3-r0?arch=riscv64&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=riscv64&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=riscv64&distroversion=v3.20&reponame=community
23
url pkg:apk/alpine/docker@23.0.3-r0?arch=x86_64&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=x86_64&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=x86_64&distroversion=v3.20&reponame=community
24
url pkg:apk/alpine/docker@23.0.3-r0?arch=aarch64&distroversion=v3.19&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=aarch64&distroversion=v3.19&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=aarch64&distroversion=v3.19&reponame=community
25
url pkg:apk/alpine/docker@23.0.3-r0?arch=armhf&distroversion=v3.19&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=armhf&distroversion=v3.19&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=armhf&distroversion=v3.19&reponame=community
26
url pkg:apk/alpine/docker@23.0.3-r0?arch=aarch64&distroversion=edge&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=aarch64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=aarch64&distroversion=edge&reponame=community
27
url pkg:apk/alpine/docker@23.0.3-r0?arch=armhf&distroversion=edge&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=armhf&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=armhf&distroversion=edge&reponame=community
28
url pkg:apk/alpine/docker@23.0.3-r0?arch=armv7&distroversion=edge&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=armv7&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=armv7&distroversion=edge&reponame=community
29
url pkg:apk/alpine/docker@23.0.3-r0?arch=ppc64le&distroversion=edge&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=ppc64le&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=ppc64le&distroversion=edge&reponame=community
30
url pkg:apk/alpine/docker@23.0.3-r0?arch=s390x&distroversion=edge&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=s390x&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=s390x&distroversion=edge&reponame=community
31
url pkg:apk/alpine/docker@23.0.3-r0?arch=x86&distroversion=edge&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=x86&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=x86&distroversion=edge&reponame=community
32
url pkg:apk/alpine/docker@23.0.3-r0?arch=aarch64&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=aarch64&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=aarch64&distroversion=v3.18&reponame=community
33
url pkg:apk/alpine/docker@23.0.3-r0?arch=armv7&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=armv7&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=armv7&distroversion=v3.18&reponame=community
34
url pkg:apk/alpine/docker@23.0.3-r0?arch=ppc64le&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=ppc64le&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=ppc64le&distroversion=v3.18&reponame=community
35
url pkg:apk/alpine/docker@23.0.3-r0?arch=s390x&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=s390x&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=s390x&distroversion=v3.18&reponame=community
36
url pkg:apk/alpine/docker@23.0.3-r0?arch=aarch64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=aarch64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=aarch64&distroversion=v3.22&reponame=community
37
url pkg:apk/alpine/docker@23.0.3-r0?arch=armhf&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=armhf&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=armhf&distroversion=v3.22&reponame=community
38
url pkg:apk/alpine/docker@23.0.3-r0?arch=loongarch64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=loongarch64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=loongarch64&distroversion=v3.22&reponame=community
39
url pkg:apk/alpine/docker@23.0.3-r0?arch=ppc64le&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=ppc64le&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=ppc64le&distroversion=v3.22&reponame=community
40
url pkg:apk/alpine/docker@23.0.3-r0?arch=riscv64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=riscv64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=riscv64&distroversion=v3.22&reponame=community
41
url pkg:apk/alpine/docker@23.0.3-r0?arch=s390x&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=s390x&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=s390x&distroversion=v3.22&reponame=community
42
url pkg:apk/alpine/docker@23.0.3-r0?arch=x86&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=x86&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=x86&distroversion=v3.22&reponame=community
43
url pkg:apk/alpine/docker@23.0.3-r0?arch=x86_64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=x86_64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=x86_64&distroversion=v3.22&reponame=community
44
url pkg:apk/alpine/docker@23.0.3-r0?arch=ppc64le&distroversion=v3.19&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=ppc64le&distroversion=v3.19&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=ppc64le&distroversion=v3.19&reponame=community
45
url pkg:apk/alpine/docker@23.0.3-r0?arch=s390x&distroversion=v3.19&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=s390x&distroversion=v3.19&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=s390x&distroversion=v3.19&reponame=community
46
url pkg:apk/alpine/docker@23.0.3-r0?arch=x86&distroversion=v3.19&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=x86&distroversion=v3.19&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=x86&distroversion=v3.19&reponame=community
47
url pkg:apk/alpine/docker@23.0.3-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=armhf&distroversion=v3.23&reponame=community
48
url pkg:apk/alpine/docker@23.0.3-r0?arch=armv7&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=armv7&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=armv7&distroversion=v3.23&reponame=community
49
url pkg:apk/alpine/docker@23.0.3-r0?arch=loongarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=loongarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=loongarch64&distroversion=v3.23&reponame=community
50
url pkg:apk/alpine/docker@23.0.3-r0?arch=ppc64le&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=ppc64le&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=ppc64le&distroversion=v3.23&reponame=community
51
url pkg:apk/alpine/docker@23.0.3-r0?arch=aarch64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=aarch64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=aarch64&distroversion=v3.21&reponame=community
52
url pkg:apk/alpine/docker@23.0.3-r0?arch=armhf&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=armhf&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=armhf&distroversion=v3.21&reponame=community
53
url pkg:apk/alpine/docker@23.0.3-r0?arch=armv7&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=armv7&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=armv7&distroversion=v3.21&reponame=community
54
url pkg:apk/alpine/docker@23.0.3-r0?arch=loongarch64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=loongarch64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=loongarch64&distroversion=v3.21&reponame=community
55
url pkg:apk/alpine/docker@23.0.3-r0?arch=riscv64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=riscv64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=riscv64&distroversion=v3.21&reponame=community
56
url pkg:apk/alpine/docker@23.0.3-r0?arch=s390x&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=s390x&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=s390x&distroversion=v3.21&reponame=community
57
url pkg:apk/alpine/docker@23.0.3-r0?arch=x86&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=x86&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=x86&distroversion=v3.21&reponame=community
58
url pkg:apk/alpine/docker@23.0.3-r0?arch=armv7&distroversion=v3.19&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=armv7&distroversion=v3.19&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=armv7&distroversion=v3.19&reponame=community
59
url pkg:apk/alpine/docker@23.0.3-r0?arch=x86_64&distroversion=v3.19&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=x86_64&distroversion=v3.19&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=x86_64&distroversion=v3.19&reponame=community
60
url pkg:apk/alpine/docker@23.0.3-r0?arch=riscv64&distroversion=edge&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=riscv64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=riscv64&distroversion=edge&reponame=community
61
url pkg:apk/alpine/docker@23.0.3-r0?arch=x86_64&distroversion=edge&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=x86_64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=x86_64&distroversion=edge&reponame=community
62
url pkg:apk/alpine/docker@23.0.3-r0?arch=x86&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=x86&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=x86&distroversion=v3.18&reponame=community
63
url pkg:apk/alpine/docker@23.0.3-r0?arch=x86_64&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=x86_64&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=x86_64&distroversion=v3.18&reponame=community
64
url pkg:apk/alpine/docker@23.0.3-r0?arch=armv7&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/docker@23.0.3-r0?arch=armv7&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/docker@23.0.3-r0%3Farch=armv7&distroversion=v3.22&reponame=community
65
url pkg:deb/debian/docker.io@20.10.24%2Bdfsg1-1
purl pkg:deb/debian/docker.io@20.10.24%2Bdfsg1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/docker.io@20.10.24%252Bdfsg1-1
66
url pkg:deb/debian/docker.io@20.10.24%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/docker.io@20.10.24%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/docker.io@20.10.24%252Bdfsg1-1%3Fdistro=trixie
67
url pkg:deb/debian/docker.io@20.10.24%2Bdfsg1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/docker.io@20.10.24%2Bdfsg1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1sky-21r5-3qcu
1
vulnerability VCID-6tg9-3vhh-muae
2
vulnerability VCID-8e1u-z6kg-ryhc
3
vulnerability VCID-b2qe-8u58-2qck
4
vulnerability VCID-njcw-wc13-dqcz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/docker.io@20.10.24%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie
68
url pkg:deb/debian/docker.io@26.1.5%2Bdfsg1-9?distro=trixie
purl pkg:deb/debian/docker.io@26.1.5%2Bdfsg1-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/docker.io@26.1.5%252Bdfsg1-9%3Fdistro=trixie
69
url pkg:deb/debian/docker.io@28.5.2%2Bdfsg3-2?distro=trixie
purl pkg:deb/debian/docker.io@28.5.2%2Bdfsg3-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/docker.io@28.5.2%252Bdfsg3-2%3Fdistro=trixie
70
url pkg:ebuild/app-containers/docker@25.0.4
purl pkg:ebuild/app-containers/docker@25.0.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-containers/docker@25.0.4
Affected_packages
0
url pkg:deb/debian/docker.io@20.10.5%2Bdfsg1-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/docker.io@20.10.5%2Bdfsg1-1%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1sky-21r5-3qcu
1
vulnerability VCID-6tg9-3vhh-muae
2
vulnerability VCID-8e1u-z6kg-ryhc
3
vulnerability VCID-avqu-wswg-c3ga
4
vulnerability VCID-b2qe-8u58-2qck
5
vulnerability VCID-bzeb-kj67-vfds
6
vulnerability VCID-e82r-vc77-f7bz
7
vulnerability VCID-njcw-wc13-dqcz
8
vulnerability VCID-quyf-eq2s-dbda
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/docker.io@20.10.5%252Bdfsg1-1%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/docker.io@20.10.5%2Bdfsg1-1%2Bdeb11u2
purl pkg:deb/debian/docker.io@20.10.5%2Bdfsg1-1%2Bdeb11u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1sky-21r5-3qcu
1
vulnerability VCID-41ft-14gt-bbbq
2
vulnerability VCID-6tg9-3vhh-muae
3
vulnerability VCID-8e1u-z6kg-ryhc
4
vulnerability VCID-avqu-wswg-c3ga
5
vulnerability VCID-b2qe-8u58-2qck
6
vulnerability VCID-bzeb-kj67-vfds
7
vulnerability VCID-e82r-vc77-f7bz
8
vulnerability VCID-njcw-wc13-dqcz
9
vulnerability VCID-quyf-eq2s-dbda
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/docker.io@20.10.5%252Bdfsg1-1%252Bdeb11u2
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28842.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28842.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28842
reference_id
reference_type
scores
0
value 0.006
scoring_system epss
scoring_elements 0.69398
published_at 2026-04-02T12:55:00Z
1
value 0.006
scoring_system epss
scoring_elements 0.69414
published_at 2026-04-04T12:55:00Z
2
value 0.00636
scoring_system epss
scoring_elements 0.705
published_at 2026-04-16T12:55:00Z
3
value 0.00636
scoring_system epss
scoring_elements 0.70458
published_at 2026-04-13T12:55:00Z
4
value 0.00636
scoring_system epss
scoring_elements 0.70472
published_at 2026-04-12T12:55:00Z
5
value 0.00636
scoring_system epss
scoring_elements 0.70463
published_at 2026-04-09T12:55:00Z
6
value 0.00636
scoring_system epss
scoring_elements 0.70447
published_at 2026-04-08T12:55:00Z
7
value 0.00636
scoring_system epss
scoring_elements 0.70402
published_at 2026-04-07T12:55:00Z
8
value 0.00636
scoring_system epss
scoring_elements 0.70487
published_at 2026-04-11T12:55:00Z
9
value 0.00636
scoring_system epss
scoring_elements 0.70488
published_at 2026-04-21T12:55:00Z
10
value 0.00636
scoring_system epss
scoring_elements 0.70508
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28842
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28842
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/moby/libnetwork/security/advisories/GHSA-gvm4-2qqg-m333
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T21:32:48Z/
url https://github.com/moby/libnetwork/security/advisories/GHSA-gvm4-2qqg-m333
5
reference_url https://github.com/moby/moby
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/moby/moby
6
reference_url https://github.com/moby/moby/security/advisories/GHSA-232p-vwff-86mp
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T21:32:48Z/
url https://github.com/moby/moby/security/advisories/GHSA-232p-vwff-86mp
7
reference_url https://github.com/moby/moby/security/advisories/GHSA-33pg-m6jh-5237
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T21:32:48Z/
url https://github.com/moby/moby/security/advisories/GHSA-33pg-m6jh-5237
8
reference_url https://github.com/moby/moby/security/advisories/GHSA-6wrf-mxfj-pf5p
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T21:32:48Z/
url https://github.com/moby/moby/security/advisories/GHSA-6wrf-mxfj-pf5p
9
reference_url https://github.com/moby/moby/security/advisories/GHSA-vwm3-crmr-xfxw
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T21:32:48Z/
url https://github.com/moby/moby/security/advisories/GHSA-vwm3-crmr-xfxw
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-28842
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-28842
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2184688
reference_id 2184688
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2184688
12
reference_url https://security.gentoo.org/glsa/202409-29
reference_id GLSA-202409-29
reference_type
scores
url https://security.gentoo.org/glsa/202409-29
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/
reference_id LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T21:32:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/
14
reference_url https://usn.ubuntu.com/7474-1/
reference_id USN-7474-1
reference_type
scores
url https://usn.ubuntu.com/7474-1/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE/
reference_id XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T21:32:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE/
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/
reference_id ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T21:32:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/
Weaknesses
0
cwe_id 420
name Unprotected Alternate Channel
description The product protects a primary channel, but it does not use the same level of protection for an alternate channel.
1
cwe_id 636
name Not Failing Securely ('Failing Open')
description When the product encounters an error condition or failure, its design requires it to fall back to a state that is less secure than other options that are available, such as selecting the weakest encryption algorithm or using the most permissive access control restrictions.
Exploits
Severity_range_score4.0 - 6.9
Exploitability0.5
Weighted_severity6.2
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-e82r-vc77-f7bz