Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-47290

Опубликовано: 20 мая 2025
Источник: redhat
CVSS3: 8.4
EPSS Низкий

Описание

containerd is a container runtime. A time-of-check to time-of-use (TOCTOU) vulnerability was found in containerd v2.1.0. While unpacking an image during an image pull, specially crafted container images could arbitrarily modify the host file system. The only affected version of containerd is 2.1.0. Other versions of containerd are not affected. This bug has been fixed in containerd 2.1.1. Users should update to this version to resolve the issue. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.

A flaw was found in containerd. This vulnerability allows arbitrary modification of the host file system via a time-of-check to time-of-use (TOCTOU) race condition that occurs during image unpacking. Specifically, when pulling and unpacking a specially crafted container image, an attacker could exploit the window between validation and use of file paths to perform unauthorized file system operations on the host. Successful exploitation requires the attacker to supply a malicious image and may require elevated privileges.

Отчет

The vulnerable component does not affect any product shipped by Red Hat.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Assisted Installer for Red Hat OpenShift Container Platform 2rhai-tech-preview/assisted-installer-agent-rhel8Not affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/logging-loki-rhel9Not affected
OpenShift API for Data Protectionoadp/oadp-mustgather-rhel9Not affected
OpenShift Developer Tools and Servicesocp-tools-4/jenkins-agent-base-rhel8Not affected
OpenShift Developer Tools and Servicesocp-tools-4/jenkins-rhel8Not affected
OpenShift Developer Tools and Servicesopenshift4/ose-jenkinsNot affected
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/multicluster-operators-subscription-rhel9Not affected
Red Hat Advanced Cluster Security 4advanced-cluster-security/rhacs-central-db-rhel8Not affected
Red Hat Advanced Cluster Security 4advanced-cluster-security/rhacs-main-rhel8Not affected
Red Hat Advanced Cluster Security 4advanced-cluster-security/rhacs-rhel8-operatorNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-367
https://bugzilla.redhat.com/show_bug.cgi?id=2367631containerd: Containerd vulnerable to host filesystem access during image unpack

EPSS

Процентиль: 2%
0.00016
Низкий

8.4 High

CVSS3

Связанные уязвимости

ubuntu
30 дней назад

containerd is a container runtime. A time-of-check to time-of-use (TOCTOU) vulnerability was found in containerd v2.1.0. While unpacking an image during an image pull, specially crafted container images could arbitrarily modify the host file system. The only affected version of containerd is 2.1.0. Other versions of containerd are not affected. This bug has been fixed in containerd 2.1.1. Users should update to this version to resolve the issue. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.

nvd
30 дней назад

containerd is a container runtime. A time-of-check to time-of-use (TOCTOU) vulnerability was found in containerd v2.1.0. While unpacking an image during an image pull, specially crafted container images could arbitrarily modify the host file system. The only affected version of containerd is 2.1.0. Other versions of containerd are not affected. This bug has been fixed in containerd 2.1.1. Users should update to this version to resolve the issue. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.

debian
30 дней назад

containerd is a container runtime. A time-of-check to time-of-use (TOC ...

github
29 дней назад

containerd allows host filesystem access on pull

EPSS

Процентиль: 2%
0.00016
Низкий

8.4 High

CVSS3

Уязвимость CVE-2025-47290