Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-25621

Опубликовано: 06 нояб. 2025
Источник: nvd
CVSS3: 7.3
CVSS3: 7.8
EPSS Низкий

Описание

containerd is an open-source container runtime. Versions 0.1.0 through 1.7.28, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4 and 2.2.0-beta.0 through 2.2.0-rc.1 have an overly broad default permission vulnerability. Directory paths /var/lib/containerd, /run/containerd/io.containerd.grpc.v1.cri and /run/containerd/io.containerd.sandbox.controller.v1.shim were all created with incorrect permissions. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. Workarounds include updating system administrator permissions so the host can manually chmod the directories to not have group or world accessible permissions, or to run containerd in rootless mode.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:linuxfoundation:containerd:*:*:*:*:*:*:*:*
Версия до 1.7.29 (исключая)
cpe:2.3:a:linuxfoundation:containerd:*:*:*:*:*:*:*:*
Версия от 2.0.0 (включая) до 2.0.7 (исключая)
cpe:2.3:a:linuxfoundation:containerd:*:*:*:*:*:*:*:*
Версия от 2.1.0 (включая) до 2.1.5 (исключая)
cpe:2.3:a:linuxfoundation:containerd:2.2.0:beta0:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:containerd:2.2.0:beta1:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:containerd:2.2.0:beta2:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:containerd:2.2.0:rc0:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:containerd:2.2.0:rc1:*:*:*:*:*:*

EPSS

Процентиль: 0%
0.00005
Низкий

7.3 High

CVSS3

7.8 High

CVSS3

Дефекты

CWE-279

Связанные уязвимости

CVSS3: 7.3
ubuntu
3 месяца назад

containerd is an open-source container runtime. Versions 0.1.0 through 1.7.28, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4 and 2.2.0-beta.0 through 2.2.0-rc.1 have an overly broad default permission vulnerability. Directory paths `/var/lib/containerd`, `/run/containerd/io.containerd.grpc.v1.cri` and `/run/containerd/io.containerd.sandbox.controller.v1.shim` were all created with incorrect permissions. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. Workarounds include updating system administrator permissions so the host can manually chmod the directories to not have group or world accessible permissions, or to run containerd in rootless mode.

CVSS3: 7.3
msrc
3 месяца назад

containerd affected by a local privilege escalation via wide permissions on CRI directory

CVSS3: 7.3
debian
3 месяца назад

containerd is an open-source container runtime. Versions 0.1.0 through ...

CVSS3: 7.3
github
3 месяца назад

containerd affected by a local privilege escalation via wide permissions on CRI directory

suse-cvrf
2 месяца назад

Security update for containerd

EPSS

Процентиль: 0%
0.00005
Низкий

7.3 High

CVSS3

7.8 High

CVSS3

Дефекты

CWE-279