Search for vulnerabilities
Vulnerability details: VCID-dcw7-1988-aaam
Vulnerability ID VCID-dcw7-1988-aaam
Aliases CVE-2022-24769
GHSA-2mm7-x5h6-5pvq
Summary Moby is an open-source project created by Docker to enable and accelerate software containerization. A bug was found in Moby (Docker Engine) prior to version 20.10.14 where containers were incorrectly started with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during `execve(2)`. Normally, when executable programs have specified permitted file capabilities, otherwise unprivileged users and processes can execute those programs and gain the specified file capabilities up to the bounding set. Due to this bug, containers which included executable programs with inheritable file capabilities allowed otherwise unprivileged users and processes to additionally gain these inheritable file capabilities up to the container's bounding set. Containers which use Linux users and groups to perform privilege separation inside the container are most directly impacted. This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set. This bug has been fixed in Moby (Docker Engine) 20.10.14. Running containers should be stopped, deleted, and recreated for the inheritable capabilities to be reset. This fix changes Moby (Docker Engine) behavior such that containers are started with a more typical Linux environment. As a workaround, the entry point of a container can be modified to use a utility like `capsh(1)` to drop inheritable capabilities prior to the primary process starting.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
rhas Moderate https://access.redhat.com/errata/RHSA-2022:1357
rhas Moderate https://access.redhat.com/errata/RHSA-2022:1363
rhas Moderate https://access.redhat.com/errata/RHSA-2022:1370
rhas Moderate https://access.redhat.com/errata/RHSA-2022:1622
rhas Moderate https://access.redhat.com/errata/RHSA-2022:1699
rhas Moderate https://access.redhat.com/errata/RHSA-2022:2265
cvssv3 4.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24769.json
epss 0.00084 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00084 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00084 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00084 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00084 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00086 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00086 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00086 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00086 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00086 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00086 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00086 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00086 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00114 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00169 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00169 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
epss 0.00169 https://api.first.org/data/v1/epss?cve=CVE-2022-24769
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=2066837
cvssv3.1 5.9 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 9.9 https://github.com/moby/moby
generic_textual CRITICAL https://github.com/moby/moby
cvssv3.1 5.9 https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f
generic_textual MODERATE https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f
cvssv3.1 5.9 https://github.com/moby/moby/commit/7f375bcff41ce672cd61e9a31f3eeb2966e3dbe1
generic_textual MODERATE https://github.com/moby/moby/commit/7f375bcff41ce672cd61e9a31f3eeb2966e3dbe1
cvssv3.1 5.9 https://github.com/moby/moby/releases/tag/v20.10.14
generic_textual MODERATE https://github.com/moby/moby/releases/tag/v20.10.14
cvssv3.1 5.9 https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq
generic_textual MODERATE https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq
cvssv3.1 5.9 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC
cvssv3.1 5.9 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG
cvssv3.1 5.9 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY
cvssv3.1 5.9 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL
cvssv3.1 5.9 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH
cvssv3.1 5.9 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7
cvssv3.1 5.9 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC
cvssv3.1 5.9 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG
cvssv3.1 5.9 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY
cvssv3.1 5.9 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL
cvssv3.1 5.9 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH
cvssv3.1 5.9 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7
cvssv2 4.6 https://nvd.nist.gov/vuln/detail/CVE-2022-24769
cvssv3 5.9 https://nvd.nist.gov/vuln/detail/CVE-2022-24769
cvssv3.1 5.9 https://nvd.nist.gov/vuln/detail/CVE-2022-24769
cvssv3.1 5.5 https://www.debian.org/security/2022/dsa-5162
generic_textual MODERATE https://www.debian.org/security/2022/dsa-5162
cvssv3.1 5.9 http://www.openwall.com/lists/oss-security/2022/05/12/1
generic_textual MODERATE http://www.openwall.com/lists/oss-security/2022/05/12/1
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24769.json
https://api.first.org/data/v1/epss?cve=CVE-2022-24769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31030
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/moby/moby
https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f
https://github.com/moby/moby/commit/7f375bcff41ce672cd61e9a31f3eeb2966e3dbe1
https://github.com/moby/moby/releases/tag/v20.10.14
https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/
https://www.debian.org/security/2022/dsa-5162
http://www.openwall.com/lists/oss-security/2022/05/12/1
2066837 https://bugzilla.redhat.com/show_bug.cgi?id=2066837
cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
CVE-2022-24769 https://nvd.nist.gov/vuln/detail/CVE-2022-24769
GLSA-202401-31 https://security.gentoo.org/glsa/202401-31
RHSA-2022:1357 https://access.redhat.com/errata/RHSA-2022:1357
RHSA-2022:1363 https://access.redhat.com/errata/RHSA-2022:1363
RHSA-2022:1370 https://access.redhat.com/errata/RHSA-2022:1370
RHSA-2022:1622 https://access.redhat.com/errata/RHSA-2022:1622
RHSA-2022:1699 https://access.redhat.com/errata/RHSA-2022:1699
RHSA-2022:2265 https://access.redhat.com/errata/RHSA-2022:2265
USN-5776-1 https://usn.ubuntu.com/5776-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24769.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Found at https://github.com/moby/moby
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Found at https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Found at https://github.com/moby/moby/commit/7f375bcff41ce672cd61e9a31f3eeb2966e3dbe1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Found at https://github.com/moby/moby/releases/tag/v20.10.14
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Found at https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2022-24769
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Found at https://nvd.nist.gov/vuln/detail/CVE-2022-24769
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Found at https://nvd.nist.gov/vuln/detail/CVE-2022-24769
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Found at https://www.debian.org/security/2022/dsa-5162
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Found at http://www.openwall.com/lists/oss-security/2022/05/12/1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.25605
EPSS Score 0.00084
Published At May 20, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.