Логотип exploitDog
bind:"BDU:2025-04195" OR bind:"CVE-2025-24965"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2025-04195" OR bind:"CVE-2025-24965"

Количество 7

Количество 7

fstec логотип

BDU:2025-04195

около 1 года назад

Уязвимость среды выполнения контейнера OCI Container Runtime (crun), связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю оказать влияние на конфиденциальность и целостность защищаемой информации

CVSS3: 8.7
EPSS: Низкий
redos логотип

ROS-20250403-08

12 месяцев назад

Уязвимость crun

CVSS3: 8.7
EPSS: Низкий
ubuntu логотип

CVE-2025-24965

около 1 года назад

crun is an open source OCI Container Runtime fully written in C. In affected versions A malicious container image could trick the krun handler into escaping the root filesystem, allowing file creation or modification on the host. No special permissions are needed, only the ability for the current user to write to the target file. The problem is fixed in crun 1.20 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

EPSS: Низкий
redhat логотип

CVE-2025-24965

около 1 года назад

crun is an open source OCI Container Runtime fully written in C. In affected versions A malicious container image could trick the krun handler into escaping the root filesystem, allowing file creation or modification on the host. No special permissions are needed, only the ability for the current user to write to the target file. The problem is fixed in crun 1.20 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 8.7
EPSS: Низкий
nvd логотип

CVE-2025-24965

около 1 года назад

crun is an open source OCI Container Runtime fully written in C. In affected versions A malicious container image could trick the krun handler into escaping the root filesystem, allowing file creation or modification on the host. No special permissions are needed, only the ability for the current user to write to the target file. The problem is fixed in crun 1.20 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

EPSS: Низкий
debian логотип

CVE-2025-24965

около 1 года назад

crun is an open source OCI Container Runtime fully written in C. In af ...

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2025:0074-1

около 1 года назад

Security update for crun

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2025-04195

Уязвимость среды выполнения контейнера OCI Container Runtime (crun), связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю оказать влияние на конфиденциальность и целостность защищаемой информации

CVSS3: 8.7
0%
Низкий
около 1 года назад
redos логотип
ROS-20250403-08

Уязвимость crun

CVSS3: 8.7
0%
Низкий
12 месяцев назад
ubuntu логотип
CVE-2025-24965

crun is an open source OCI Container Runtime fully written in C. In affected versions A malicious container image could trick the krun handler into escaping the root filesystem, allowing file creation or modification on the host. No special permissions are needed, only the ability for the current user to write to the target file. The problem is fixed in crun 1.20 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

0%
Низкий
около 1 года назад
redhat логотип
CVE-2025-24965

crun is an open source OCI Container Runtime fully written in C. In affected versions A malicious container image could trick the krun handler into escaping the root filesystem, allowing file creation or modification on the host. No special permissions are needed, only the ability for the current user to write to the target file. The problem is fixed in crun 1.20 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 8.7
0%
Низкий
около 1 года назад
nvd логотип
CVE-2025-24965

crun is an open source OCI Container Runtime fully written in C. In affected versions A malicious container image could trick the krun handler into escaping the root filesystem, allowing file creation or modification on the host. No special permissions are needed, only the ability for the current user to write to the target file. The problem is fixed in crun 1.20 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

0%
Низкий
около 1 года назад
debian логотип
CVE-2025-24965

crun is an open source OCI Container Runtime fully written in C. In af ...

0%
Низкий
около 1 года назад
suse-cvrf логотип
openSUSE-SU-2025:0074-1

Security update for crun

около 1 года назад

Уязвимостей на страницу