Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-25621

Опубликовано: 06 нояб. 2025
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.3

Описание

containerd is an open-source container runtime. Versions 0.1.0 through 1.7.28, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4 and 2.2.0-beta.0 through 2.2.0-rc.1 have an overly broad default permission vulnerability. Directory paths /var/lib/containerd, /run/containerd/io.containerd.grpc.v1.cri and /run/containerd/io.containerd.sandbox.controller.v1.shim were all created with incorrect permissions. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. Workarounds include updating system administrator permissions so the host can manually chmod the directories to not have group or world accessible permissions, or to run containerd in rootless mode.

РелизСтатусПримечание
devel

not-affected

1.7.24~ds1-10ubuntu1
esm-apps/bionic

released

1.6.12-0ubuntu1~18.04.1+esm3
esm-apps/noble

released

1.6.24~ds1-1ubuntu1.3+esm2
esm-apps/xenial

released

1.2.6-0ubuntu1~16.04.6+esm6
esm-infra/focal

released

1.6.12-0ubuntu1~20.04.8+esm1
jammy

released

1.6.12-0ubuntu1~22.04.10
noble

needed

plucky

ignored

end of life, was needs-triage
questing

released

1.7.24~ds1-8ubuntu1.1
upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

not-affected

2.2.1-0ubuntu1
esm-apps/focal

released

1.7.24-0ubuntu1~20.04.2+esm1
esm-apps/jammy

released

1.7.28-0ubuntu1~22.04.1+esm1
jammy

needed

noble

released

1.7.28-0ubuntu1~24.04.2
plucky

ignored

end of life, was needs-triage
questing

released

2.1.3-0ubuntu3.1
upstream

needs-triage

Показывать по

EPSS

Процентиль: 0%
0.00005
Низкий

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 7.3
nvd
3 месяца назад

containerd is an open-source container runtime. Versions 0.1.0 through 1.7.28, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4 and 2.2.0-beta.0 through 2.2.0-rc.1 have an overly broad default permission vulnerability. Directory paths `/var/lib/containerd`, `/run/containerd/io.containerd.grpc.v1.cri` and `/run/containerd/io.containerd.sandbox.controller.v1.shim` were all created with incorrect permissions. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. Workarounds include updating system administrator permissions so the host can manually chmod the directories to not have group or world accessible permissions, or to run containerd in rootless mode.

CVSS3: 7.3
msrc
3 месяца назад

containerd affected by a local privilege escalation via wide permissions on CRI directory

CVSS3: 7.3
debian
3 месяца назад

containerd is an open-source container runtime. Versions 0.1.0 through ...

CVSS3: 7.3
github
3 месяца назад

containerd affected by a local privilege escalation via wide permissions on CRI directory

suse-cvrf
2 месяца назад

Security update for containerd

EPSS

Процентиль: 0%
0.00005
Низкий

7.3 High

CVSS3