Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-zcvb-3gz4-xqdw
Summarycifs-utils: kernel: cifs-utils: cifs.upcall makes an upcall to the wrong namespace in containerized environments
Aliases
0
alias CVE-2025-2312
Fixed_packages
0
url pkg:deb/debian/cifs-utils@0?distro=trixie
purl pkg:deb/debian/cifs-utils@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cifs-utils@0%3Fdistro=trixie
1
url pkg:deb/debian/cifs-utils@2:6.11-3.1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/cifs-utils@2:6.11-3.1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cifs-utils@2:6.11-3.1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/cifs-utils@2:7.2-1?distro=trixie
purl pkg:deb/debian/cifs-utils@2:7.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cifs-utils@2:7.2-1%3Fdistro=trixie
3
url pkg:deb/debian/cifs-utils@2:7.4-1?distro=trixie
purl pkg:deb/debian/cifs-utils@2:7.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cifs-utils@2:7.4-1%3Fdistro=trixie
4
url pkg:deb/debian/cifs-utils@2:7.4-1
purl pkg:deb/debian/cifs-utils@2:7.4-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cifs-utils@2:7.4-1
Affected_packages
0
url pkg:deb/debian/cifs-utils@2:7.0-2?distro=trixie
purl pkg:deb/debian/cifs-utils@2:7.0-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zcvb-3gz4-xqdw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cifs-utils@2:7.0-2%3Fdistro=trixie
1
url pkg:deb/debian/cifs-utils@2:7.0-2
purl pkg:deb/debian/cifs-utils@2:7.0-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zcvb-3gz4-xqdw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cifs-utils@2:7.0-2
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-2312.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-2312.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-2312
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09316
published_at 2026-04-02T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09411
published_at 2026-04-21T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09412
published_at 2026-04-11T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09383
published_at 2026-04-12T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09368
published_at 2026-04-13T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.0926
published_at 2026-04-16T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09261
published_at 2026-04-18T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09365
published_at 2026-04-04T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09276
published_at 2026-04-07T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09352
published_at 2026-04-08T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.094
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-2312
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106242
reference_id 1106242
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106242
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2352604
reference_id 2352604
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2352604
5
reference_url https://git.samba.org/?p=cifs-utils.git;a=commit;h=89b679228cc1be9739d54203d28289b03352c174
reference_id ?p=cifs-utils.git;a=commit;h=89b679228cc1be9739d54203d28289b03352c174
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-25T18:22:51Z/
url https://git.samba.org/?p=cifs-utils.git;a=commit;h=89b679228cc1be9739d54203d28289b03352c174
6
reference_url https://web.git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/smb?id=db363b0a1d9e6b9dc556296f1b1007aeb496a8cf
reference_id smb?id=db363b0a1d9e6b9dc556296f1b1007aeb496a8cf
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-25T18:22:51Z/
url https://web.git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/smb?id=db363b0a1d9e6b9dc556296f1b1007aeb496a8cf
7
reference_url https://usn.ubuntu.com/7384-1/
reference_id USN-7384-1
reference_type
scores
url https://usn.ubuntu.com/7384-1/
8
reference_url https://usn.ubuntu.com/7384-2/
reference_id USN-7384-2
reference_type
scores
url https://usn.ubuntu.com/7384-2/
9
reference_url https://usn.ubuntu.com/7448-1/
reference_id USN-7448-1
reference_type
scores
url https://usn.ubuntu.com/7448-1/
10
reference_url https://usn.ubuntu.com/7468-1/
reference_id USN-7468-1
reference_type
scores
url https://usn.ubuntu.com/7468-1/
11
reference_url https://usn.ubuntu.com/7536-1/
reference_id USN-7536-1
reference_type
scores
url https://usn.ubuntu.com/7536-1/
12
reference_url https://usn.ubuntu.com/7585-1/
reference_id USN-7585-1
reference_type
scores
url https://usn.ubuntu.com/7585-1/
13
reference_url https://usn.ubuntu.com/7585-2/
reference_id USN-7585-2
reference_type
scores
url https://usn.ubuntu.com/7585-2/
14
reference_url https://usn.ubuntu.com/7585-3/
reference_id USN-7585-3
reference_type
scores
url https://usn.ubuntu.com/7585-3/
15
reference_url https://usn.ubuntu.com/7585-4/
reference_id USN-7585-4
reference_type
scores
url https://usn.ubuntu.com/7585-4/
16
reference_url https://usn.ubuntu.com/7585-5/
reference_id USN-7585-5
reference_type
scores
url https://usn.ubuntu.com/7585-5/
17
reference_url https://usn.ubuntu.com/7585-6/
reference_id USN-7585-6
reference_type
scores
url https://usn.ubuntu.com/7585-6/
18
reference_url https://usn.ubuntu.com/7585-7/
reference_id USN-7585-7
reference_type
scores
url https://usn.ubuntu.com/7585-7/
19
reference_url https://usn.ubuntu.com/7591-1/
reference_id USN-7591-1
reference_type
scores
url https://usn.ubuntu.com/7591-1/
20
reference_url https://usn.ubuntu.com/7591-2/
reference_id USN-7591-2
reference_type
scores
url https://usn.ubuntu.com/7591-2/
21
reference_url https://usn.ubuntu.com/7591-3/
reference_id USN-7591-3
reference_type
scores
url https://usn.ubuntu.com/7591-3/
22
reference_url https://usn.ubuntu.com/7591-4/
reference_id USN-7591-4
reference_type
scores
url https://usn.ubuntu.com/7591-4/
23
reference_url https://usn.ubuntu.com/7591-5/
reference_id USN-7591-5
reference_type
scores
url https://usn.ubuntu.com/7591-5/
24
reference_url https://usn.ubuntu.com/7591-6/
reference_id USN-7591-6
reference_type
scores
url https://usn.ubuntu.com/7591-6/
25
reference_url https://usn.ubuntu.com/7592-1/
reference_id USN-7592-1
reference_type
scores
url https://usn.ubuntu.com/7592-1/
26
reference_url https://usn.ubuntu.com/7593-1/
reference_id USN-7593-1
reference_type
scores
url https://usn.ubuntu.com/7593-1/
27
reference_url https://usn.ubuntu.com/7595-1/
reference_id USN-7595-1
reference_type
scores
url https://usn.ubuntu.com/7595-1/
28
reference_url https://usn.ubuntu.com/7595-2/
reference_id USN-7595-2
reference_type
scores
url https://usn.ubuntu.com/7595-2/
29
reference_url https://usn.ubuntu.com/7595-3/
reference_id USN-7595-3
reference_type
scores
url https://usn.ubuntu.com/7595-3/
30
reference_url https://usn.ubuntu.com/7595-4/
reference_id USN-7595-4
reference_type
scores
url https://usn.ubuntu.com/7595-4/
31
reference_url https://usn.ubuntu.com/7595-5/
reference_id USN-7595-5
reference_type
scores
url https://usn.ubuntu.com/7595-5/
32
reference_url https://usn.ubuntu.com/7602-1/
reference_id USN-7602-1
reference_type
scores
url https://usn.ubuntu.com/7602-1/
33
reference_url https://usn.ubuntu.com/7605-1/
reference_id USN-7605-1
reference_type
scores
url https://usn.ubuntu.com/7605-1/
34
reference_url https://usn.ubuntu.com/7605-2/
reference_id USN-7605-2
reference_type
scores
url https://usn.ubuntu.com/7605-2/
35
reference_url https://usn.ubuntu.com/7606-1/
reference_id USN-7606-1
reference_type
scores
url https://usn.ubuntu.com/7606-1/
36
reference_url https://usn.ubuntu.com/7628-1/
reference_id USN-7628-1
reference_type
scores
url https://usn.ubuntu.com/7628-1/
37
reference_url https://usn.ubuntu.com/7640-1/
reference_id USN-7640-1
reference_type
scores
url https://usn.ubuntu.com/7640-1/
38
reference_url https://usn.ubuntu.com/7653-1/
reference_id USN-7653-1
reference_type
scores
url https://usn.ubuntu.com/7653-1/
39
reference_url https://usn.ubuntu.com/7655-1/
reference_id USN-7655-1
reference_type
scores
url https://usn.ubuntu.com/7655-1/
Weaknesses
0
cwe_id 488
name Exposure of Data Element to Wrong Session
description The product does not sufficiently enforce boundaries between the states of different sessions, causing data to be provided to, or used by, the wrong session.
Exploits
Severity_range_score5.9 - 6.5
Exploitability0.5
Weighted_severity5.3
Risk_score2.6
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-zcvb-3gz4-xqdw