Search for vulnerabilities
Vulnerability details: VCID-9qvq-4hcd-aaar
Vulnerability ID VCID-9qvq-4hcd-aaar
Aliases CVE-2023-25173
GHSA-hmfx-3pcx-653p
Summary containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container entrypoint to a value similar to `ENTRYPOINT ["su", "-", "user"]` to allow `su` to properly set up supplementary groups.
Status Published
Exploitability 0.5
Weighted Severity 7.0
Risk 3.5
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 7.3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25173.json
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00122 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00165 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00165 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00165 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00165 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00165 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00165 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
epss 0.00165 https://api.first.org/data/v1/epss?cve=CVE-2023-25173
cvssv3.1 5.3 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 5.3 https://github.com/advisories/GHSA-4wjj-jwc9-2x96
cvssv3.1 5.3 https://github.com/advisories/GHSA-4wjj-jwc9-2x96
cvssv3.1 5.3 https://github.com/advisories/GHSA-4wjj-jwc9-2x96
generic_textual MODERATE https://github.com/advisories/GHSA-4wjj-jwc9-2x96
ssvc Track https://github.com/advisories/GHSA-4wjj-jwc9-2x96
ssvc Track https://github.com/advisories/GHSA-4wjj-jwc9-2x96
cvssv3.1 5.3 https://github.com/advisories/GHSA-fjm8-m7m6-2fjp
cvssv3.1 5.3 https://github.com/advisories/GHSA-fjm8-m7m6-2fjp
cvssv3.1 5.3 https://github.com/advisories/GHSA-fjm8-m7m6-2fjp
generic_textual MODERATE https://github.com/advisories/GHSA-fjm8-m7m6-2fjp
ssvc Track https://github.com/advisories/GHSA-fjm8-m7m6-2fjp
ssvc Track https://github.com/advisories/GHSA-fjm8-m7m6-2fjp
cvssv3.1 5.3 https://github.com/advisories/GHSA-phjr-8j92-w5v7
cvssv3.1 5.3 https://github.com/advisories/GHSA-phjr-8j92-w5v7
cvssv3.1 5.3 https://github.com/advisories/GHSA-phjr-8j92-w5v7
generic_textual MODERATE https://github.com/advisories/GHSA-phjr-8j92-w5v7
ssvc Track https://github.com/advisories/GHSA-phjr-8j92-w5v7
ssvc Track https://github.com/advisories/GHSA-phjr-8j92-w5v7
cvssv3.1 5.3 https://github.com/containerd/containerd
generic_textual MODERATE https://github.com/containerd/containerd
cvssv3.1 5.3 https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a
cvssv3.1 5.3 https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a
cvssv3.1 5.3 https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a
generic_textual MODERATE https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a
ssvc Track https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a
ssvc Track https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a
cvssv3.1 5.3 https://github.com/containerd/containerd/releases/tag/v1.5.18
cvssv3.1 5.3 https://github.com/containerd/containerd/releases/tag/v1.5.18
cvssv3.1 5.3 https://github.com/containerd/containerd/releases/tag/v1.5.18
generic_textual MODERATE https://github.com/containerd/containerd/releases/tag/v1.5.18
ssvc Track https://github.com/containerd/containerd/releases/tag/v1.5.18
ssvc Track https://github.com/containerd/containerd/releases/tag/v1.5.18
cvssv3.1 5.3 https://github.com/containerd/containerd/releases/tag/v1.6.18
cvssv3.1 5.3 https://github.com/containerd/containerd/releases/tag/v1.6.18
cvssv3.1 5.3 https://github.com/containerd/containerd/releases/tag/v1.6.18
generic_textual MODERATE https://github.com/containerd/containerd/releases/tag/v1.6.18
ssvc Track https://github.com/containerd/containerd/releases/tag/v1.6.18
ssvc Track https://github.com/containerd/containerd/releases/tag/v1.6.18
cvssv3.1 5.3 https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p
cvssv3.1 5.3 https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p
cvssv3.1 5.3 https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p
generic_textual MODERATE https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p
ssvc Track https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p
ssvc Track https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p
cvssv3.1 5.3 https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4
cvssv3.1 5.3 https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4
cvssv3.1 5.3 https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4
generic_textual MODERATE https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4
ssvc Track https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4
ssvc Track https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4
cvssv3.1 6.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC
cvssv3.1 5.3 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/
cvssv3.1 5.3 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/
cvssv3.1 6.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE
cvssv3.1 5.3 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE/
cvssv3.1 6.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI
cvssv3.1 5.3 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/
cvssv3.1 5.3 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/
cvssv3 7.8 https://nvd.nist.gov/vuln/detail/CVE-2023-25173
cvssv3.1 7.8 https://nvd.nist.gov/vuln/detail/CVE-2023-25173
cvssv3.1 5.3 https://pkg.go.dev/vuln/GO-2023-1574
generic_textual MODERATE https://pkg.go.dev/vuln/GO-2023-1574
cvssv3.1 5.3 https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation
generic_textual MODERATE https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation
cvssv3.1 5.3 https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
cvssv3.1 5.3 https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
ssvc Track https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
ssvc Track https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25173.json
https://api.first.org/data/v1/epss?cve=CVE-2023-25173
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25173
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/advisories/GHSA-4wjj-jwc9-2x96
https://github.com/advisories/GHSA-fjm8-m7m6-2fjp
https://github.com/advisories/GHSA-phjr-8j92-w5v7
https://github.com/containerd/containerd
https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a
https://github.com/containerd/containerd/releases/tag/v1.5.18
https://github.com/containerd/containerd/releases/tag/v1.6.18
https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p
https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/
https://pkg.go.dev/vuln/GO-2023-1574
https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation
https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
2174485 https://bugzilla.redhat.com/show_bug.cgi?id=2174485
cpe:2.3:a:linuxfoundation:containerd:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:containerd:*:*:*:*:*:*:*:*
CVE-2023-25173 https://nvd.nist.gov/vuln/detail/CVE-2023-25173
GLSA-202408-01 https://security.gentoo.org/glsa/202408-01
RHSA-2023:1326 https://access.redhat.com/errata/RHSA-2023:1326
RHSA-2023:1372 https://access.redhat.com/errata/RHSA-2023:1372
RHSA-2023:2029 https://access.redhat.com/errata/RHSA-2023:2029
RHSA-2023:2107 https://access.redhat.com/errata/RHSA-2023:2107
RHSA-2023:3450 https://access.redhat.com/errata/RHSA-2023:3450
RHSA-2023:3455 https://access.redhat.com/errata/RHSA-2023:3455
RHSA-2023:3537 https://access.redhat.com/errata/RHSA-2023:3537
RHSA-2023:4025 https://access.redhat.com/errata/RHSA-2023:4025
RHSA-2023:4226 https://access.redhat.com/errata/RHSA-2023:4226
RHSA-2023:4488 https://access.redhat.com/errata/RHSA-2023:4488
RHSA-2023:4671 https://access.redhat.com/errata/RHSA-2023:4671
RHSA-2023:5314 https://access.redhat.com/errata/RHSA-2023:5314
RHSA-2023:6473 https://access.redhat.com/errata/RHSA-2023:6473
RHSA-2023:6474 https://access.redhat.com/errata/RHSA-2023:6474
RHSA-2023:6817 https://access.redhat.com/errata/RHSA-2023:6817
RHSA-2023:6939 https://access.redhat.com/errata/RHSA-2023:6939
USN-6202-1 https://usn.ubuntu.com/6202-1/
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25173.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://github.com/advisories/GHSA-4wjj-jwc9-2x96
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://github.com/advisories/GHSA-4wjj-jwc9-2x96
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://github.com/advisories/GHSA-4wjj-jwc9-2x96
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/ Found at https://github.com/advisories/GHSA-4wjj-jwc9-2x96

Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/ Found at https://github.com/advisories/GHSA-4wjj-jwc9-2x96
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://github.com/advisories/GHSA-fjm8-m7m6-2fjp
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://github.com/advisories/GHSA-fjm8-m7m6-2fjp
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://github.com/advisories/GHSA-fjm8-m7m6-2fjp
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/ Found at https://github.com/advisories/GHSA-fjm8-m7m6-2fjp

Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/ Found at https://github.com/advisories/GHSA-fjm8-m7m6-2fjp
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://github.com/advisories/GHSA-phjr-8j92-w5v7
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://github.com/advisories/GHSA-phjr-8j92-w5v7
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://github.com/advisories/GHSA-phjr-8j92-w5v7
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/ Found at https://github.com/advisories/GHSA-phjr-8j92-w5v7

Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/ Found at https://github.com/advisories/GHSA-phjr-8j92-w5v7
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://github.com/containerd/containerd
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/ Found at https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a

Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/ Found at https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://github.com/containerd/containerd/releases/tag/v1.5.18
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://github.com/containerd/containerd/releases/tag/v1.5.18
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://github.com/containerd/containerd/releases/tag/v1.5.18
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/ Found at https://github.com/containerd/containerd/releases/tag/v1.5.18

Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/ Found at https://github.com/containerd/containerd/releases/tag/v1.5.18
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://github.com/containerd/containerd/releases/tag/v1.6.18
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://github.com/containerd/containerd/releases/tag/v1.6.18
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://github.com/containerd/containerd/releases/tag/v1.6.18
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/ Found at https://github.com/containerd/containerd/releases/tag/v1.6.18

Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/ Found at https://github.com/containerd/containerd/releases/tag/v1.6.18
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/ Found at https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p

Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/ Found at https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/ Found at https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4

Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/ Found at https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/

Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/

Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-25173
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-25173
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://pkg.go.dev/vuln/GO-2023-1574
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/ Found at https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/

Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:44Z/ Found at https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
Exploit Prediction Scoring System (EPSS)
Percentile 0.04399
EPSS Score 0.00022
Published At April 15, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.