Логотип exploitDog
bind:CVE-2023-25173
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-25173

Количество 16

Количество 16

ubuntu логотип

CVE-2023-25173

около 3 лет назад

containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container ...

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2023-25173

около 3 лет назад

containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container ...

CVSS3: 7.3
EPSS: Низкий
nvd логотип

CVE-2023-25173

около 3 лет назад

containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container en

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2023-25173

около 3 лет назад

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2023-25173

около 3 лет назад

containerd is an open source container runtime. A bug was found in con ...

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-hmfx-3pcx-653p

около 3 лет назад

Supplementary groups are not set up properly in github.com/containerd/containerd

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2023-01488

около 3 лет назад

Уязвимость среды выполнения контейнеров Containerd, связанная с недостатками разграничения доступа, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или выполнить произвольный код

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4124-1

больше 2 лет назад

Security update for helm

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1827-1

почти 3 года назад

Security update for containerd

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1826-1

почти 3 года назад

Security update for containerd

EPSS: Низкий
redos логотип

ROS-20230322-02

около 3 лет назад

Множественные уязвимости containerd

CVSS3: 7.8
EPSS: Низкий
oracle-oval логотип

ELSA-2023-6473

больше 2 лет назад

ELSA-2023-6473: buildah security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-6474

больше 2 лет назад

ELSA-2023-6474: podman security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
rocky логотип

RLSA-2023:6939

4 месяца назад

Moderate: container-tools:rhel8 security and bug fix update

EPSS: Низкий
oracle-oval логотип

ELSA-2023-6939

больше 2 лет назад

ELSA-2023-6939: container-tools:ol8 security and bug fix update (MODERATE)

EPSS: Низкий
redos логотип

ROS-20240418-06

почти 2 года назад

Множественные уязвимости buildah

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-25173

containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container ...

CVSS3: 5.3
0%
Низкий
около 3 лет назад
redhat логотип
CVE-2023-25173

containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container ...

CVSS3: 7.3
0%
Низкий
около 3 лет назад
nvd логотип
CVE-2023-25173

containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container en

CVSS3: 5.3
0%
Низкий
около 3 лет назад
msrc логотип
CVSS3: 7.8
0%
Низкий
около 3 лет назад
debian логотип
CVE-2023-25173

containerd is an open source container runtime. A bug was found in con ...

CVSS3: 5.3
0%
Низкий
около 3 лет назад
github логотип
GHSA-hmfx-3pcx-653p

Supplementary groups are not set up properly in github.com/containerd/containerd

CVSS3: 5.3
0%
Низкий
около 3 лет назад
fstec логотип
BDU:2023-01488

Уязвимость среды выполнения контейнеров Containerd, связанная с недостатками разграничения доступа, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или выполнить произвольный код

CVSS3: 7.8
0%
Низкий
около 3 лет назад
suse-cvrf логотип
SUSE-SU-2023:4124-1

Security update for helm

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1827-1

Security update for containerd

почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:1826-1

Security update for containerd

почти 3 года назад
redos логотип
ROS-20230322-02

Множественные уязвимости containerd

CVSS3: 7.8
около 3 лет назад
oracle-oval логотип
ELSA-2023-6473

ELSA-2023-6473: buildah security update (MODERATE)

больше 2 лет назад
oracle-oval логотип
ELSA-2023-6474

ELSA-2023-6474: podman security, bug fix, and enhancement update (MODERATE)

больше 2 лет назад
rocky логотип
RLSA-2023:6939

Moderate: container-tools:rhel8 security and bug fix update

4 месяца назад
oracle-oval логотип
ELSA-2023-6939

ELSA-2023-6939: container-tools:ol8 security and bug fix update (MODERATE)

больше 2 лет назад
redos логотип
ROS-20240418-06

Множественные уязвимости buildah

CVSS3: 9.8
почти 2 года назад

Уязвимостей на страницу