Логотип exploitDog
bind:CVE-2024-25621
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-25621

Количество 10

Количество 10

ubuntu логотип

CVE-2024-25621

5 месяцев назад

containerd is an open-source container runtime. Versions 0.1.0 through 1.7.28, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4 and 2.2.0-beta.0 through 2.2.0-rc.1 have an overly broad default permission vulnerability. Directory paths `/var/lib/containerd`, `/run/containerd/io.containerd.grpc.v1.cri` and `/run/containerd/io.containerd.sandbox.controller.v1.shim` were all created with incorrect permissions. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. Workarounds include updating system administrator permissions so the host can manually chmod the directories to not have group or world accessible permissions, or to run containerd in rootless mode.

CVSS3: 7.3
EPSS: Низкий
redhat логотип

CVE-2024-25621

5 месяцев назад

containerd is an open-source container runtime. Versions 0.1.0 through 1.7.28, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4 and 2.2.0-beta.0 through 2.2.0-rc.1 have an overly broad default permission vulnerability. Directory paths `/var/lib/containerd`, `/run/containerd/io.containerd.grpc.v1.cri` and `/run/containerd/io.containerd.sandbox.controller.v1.shim` were all created with incorrect permissions. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. Workarounds include updating system administrator permissions so the host can manually chmod the directories to not have group or world accessible permissions, or to run containerd in rootless mode.

CVSS3: 7.7
EPSS: Низкий
nvd логотип

CVE-2024-25621

5 месяцев назад

containerd is an open-source container runtime. Versions 0.1.0 through 1.7.28, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4 and 2.2.0-beta.0 through 2.2.0-rc.1 have an overly broad default permission vulnerability. Directory paths `/var/lib/containerd`, `/run/containerd/io.containerd.grpc.v1.cri` and `/run/containerd/io.containerd.sandbox.controller.v1.shim` were all created with incorrect permissions. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. Workarounds include updating system administrator permissions so the host can manually chmod the directories to not have group or world accessible permissions, or to run containerd in rootless mode.

CVSS3: 7.3
EPSS: Низкий
msrc логотип

CVE-2024-25621

5 месяцев назад

containerd affected by a local privilege escalation via wide permissions on CRI directory

CVSS3: 7.3
EPSS: Низкий
debian логотип

CVE-2024-25621

5 месяцев назад

containerd is an open-source container runtime. Versions 0.1.0 through ...

CVSS3: 7.3
EPSS: Низкий
github логотип

GHSA-pwhc-rpq9-4c8w

5 месяцев назад

containerd affected by a local privilege escalation via wide permissions on CRI directory

CVSS3: 7.3
EPSS: Низкий
fstec логотип

BDU:2026-02731

5 месяцев назад

Уязвимость среды выполнения контейнеров Containerd, связанная с неправильным разрешением на исполнение, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 7.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4288-1

4 месяца назад

Security update for containerd

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4072-1

5 месяцев назад

Security update for containerd

EPSS: Низкий
redos логотип

ROS-20260209-73-0032

около 2 месяцев назад

Уязвимость containerd

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-25621

containerd is an open-source container runtime. Versions 0.1.0 through 1.7.28, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4 and 2.2.0-beta.0 through 2.2.0-rc.1 have an overly broad default permission vulnerability. Directory paths `/var/lib/containerd`, `/run/containerd/io.containerd.grpc.v1.cri` and `/run/containerd/io.containerd.sandbox.controller.v1.shim` were all created with incorrect permissions. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. Workarounds include updating system administrator permissions so the host can manually chmod the directories to not have group or world accessible permissions, or to run containerd in rootless mode.

CVSS3: 7.3
0%
Низкий
5 месяцев назад
redhat логотип
CVE-2024-25621

containerd is an open-source container runtime. Versions 0.1.0 through 1.7.28, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4 and 2.2.0-beta.0 through 2.2.0-rc.1 have an overly broad default permission vulnerability. Directory paths `/var/lib/containerd`, `/run/containerd/io.containerd.grpc.v1.cri` and `/run/containerd/io.containerd.sandbox.controller.v1.shim` were all created with incorrect permissions. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. Workarounds include updating system administrator permissions so the host can manually chmod the directories to not have group or world accessible permissions, or to run containerd in rootless mode.

CVSS3: 7.7
0%
Низкий
5 месяцев назад
nvd логотип
CVE-2024-25621

containerd is an open-source container runtime. Versions 0.1.0 through 1.7.28, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4 and 2.2.0-beta.0 through 2.2.0-rc.1 have an overly broad default permission vulnerability. Directory paths `/var/lib/containerd`, `/run/containerd/io.containerd.grpc.v1.cri` and `/run/containerd/io.containerd.sandbox.controller.v1.shim` were all created with incorrect permissions. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. Workarounds include updating system administrator permissions so the host can manually chmod the directories to not have group or world accessible permissions, or to run containerd in rootless mode.

CVSS3: 7.3
0%
Низкий
5 месяцев назад
msrc логотип
CVE-2024-25621

containerd affected by a local privilege escalation via wide permissions on CRI directory

CVSS3: 7.3
0%
Низкий
5 месяцев назад
debian логотип
CVE-2024-25621

containerd is an open-source container runtime. Versions 0.1.0 through ...

CVSS3: 7.3
0%
Низкий
5 месяцев назад
github логотип
GHSA-pwhc-rpq9-4c8w

containerd affected by a local privilege escalation via wide permissions on CRI directory

CVSS3: 7.3
0%
Низкий
5 месяцев назад
fstec логотип
BDU:2026-02731

Уязвимость среды выполнения контейнеров Containerd, связанная с неправильным разрешением на исполнение, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 7.3
0%
Низкий
5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:4288-1

Security update for containerd

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:4072-1

Security update for containerd

5 месяцев назад
redos логотип
ROS-20260209-73-0032

Уязвимость containerd

CVSS3: 7.8
0%
Низкий
около 2 месяцев назад

Уязвимостей на страницу