Логотип exploitDog
bind: "CVE-2023-25173"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2023-25173"

Количество 15

Количество 15

ubuntu логотип

CVE-2023-25173

больше 2 лет назад

containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container ...

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2023-25173

больше 2 лет назад

containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container ...

CVSS3: 7.3
EPSS: Низкий
nvd логотип

CVE-2023-25173

больше 2 лет назад

containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container en

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2023-25173

больше 2 лет назад

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2023-25173

больше 2 лет назад

containerd is an open source container runtime. A bug was found in con ...

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-hmfx-3pcx-653p

больше 2 лет назад

Supplementary groups are not set up properly in github.com/containerd/containerd

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2023-01488

больше 2 лет назад

Уязвимость среды выполнения контейнеров Containerd, связанная с недостатками разграничения доступа, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или выполнить произвольный код

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4124-1

больше 1 года назад

Security update for helm

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1827-1

около 2 лет назад

Security update for containerd

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1826-1

около 2 лет назад

Security update for containerd

EPSS: Низкий
redos логотип

ROS-20230322-02

около 2 лет назад

Множественные уязвимости containerd

CVSS3: 7.8
EPSS: Низкий
oracle-oval логотип

ELSA-2023-6473

больше 1 года назад

ELSA-2023-6473: buildah security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-6474

больше 1 года назад

ELSA-2023-6474: podman security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
redos логотип

ROS-20240418-06

около 1 года назад

Множественные уязвимости buildah

CVSS3: 9.8
EPSS: Низкий
oracle-oval логотип

ELSA-2023-6939

больше 1 года назад

ELSA-2023-6939: container-tools:ol8 security and bug fix update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-25173

containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container ...

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
redhat логотип
CVE-2023-25173

containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container ...

CVSS3: 7.3
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-25173

containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container en

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
msrc логотип
CVSS3: 7.8
0%
Низкий
больше 2 лет назад
debian логотип
CVE-2023-25173

containerd is an open source container runtime. A bug was found in con ...

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
github логотип
GHSA-hmfx-3pcx-653p

Supplementary groups are not set up properly in github.com/containerd/containerd

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-01488

Уязвимость среды выполнения контейнеров Containerd, связанная с недостатками разграничения доступа, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или выполнить произвольный код

CVSS3: 7.8
0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:4124-1

Security update for helm

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:1827-1

Security update for containerd

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1826-1

Security update for containerd

около 2 лет назад
redos логотип
ROS-20230322-02

Множественные уязвимости containerd

CVSS3: 7.8
около 2 лет назад
oracle-oval логотип
ELSA-2023-6473

ELSA-2023-6473: buildah security update (MODERATE)

больше 1 года назад
oracle-oval логотип
ELSA-2023-6474

ELSA-2023-6474: podman security, bug fix, and enhancement update (MODERATE)

больше 1 года назад
redos логотип
ROS-20240418-06

Множественные уязвимости buildah

CVSS3: 9.8
около 1 года назад
oracle-oval логотип
ELSA-2023-6939

ELSA-2023-6939: container-tools:ol8 security and bug fix update (MODERATE)

больше 1 года назад

Уязвимостей на страницу