-
Notifications
You must be signed in to change notification settings - Fork 2.8k
fix(vuln): CVE-2024-25621: While it is executing, the product sets the permissions of an object in a way that violates the intended permissions that have been specified by the user. #9831
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
It has been fixed in 2.1.5. Trivy currently uses the fixed version. |
|
@knqyf263 I am using latest trivy and still getting the CVE when scanning trivy with trivy |
|
usr/local/bin/trivy (gobinary) Total: 4 (HIGH: 4, CRITICAL: 0) ┌─────────────────────────────────────┬────────────────┬──────────┬────────┬───────────────────┬─────────────────────┬──────────────────────────────────────────────────────────────┐ |
|
The fix is in the main branch, but not yet released. |
|
Ah ok thanks |
The vulnerability usr/local/bin/trivy (gobinary)
Total: 4 (UNKNOWN: 0, LOW: 0, MEDIUM: 3, HIGH: 1, CRITICAL: 0)
┌──────────────────────────────────┬────────────────┬──────────┬────────┬───────────────────┬───────────────┬─────────────────────────────────────────────────────────────┐
│ Library │ Vulnerability │ Severity │ Status │ Installed Version │ Fixed Version │ Title │
├──────────────────────────────────┼────────────────┼──────────┼────────┼───────────────────┼───────────────┼─────────────────────────────────────────────────────────────┤
│ github.com/containerd/containerd │ CVE-2024-25621 │ HIGH │ fixed │ v1.7.28 │ 1.7.29 │ containerd is an open-source container runtime. Versions │
│ │ │ │ │ │ │ 0.1.0 through ... │
│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-25621 │
│ ├────────────────┼──────────┤ │ │ ├─────────────────────────────────────────────────────────────┤
│ │ CVE-2025-64329 │ MEDIUM │ │ │ │ containerd is an open-source container runtime. Versions │
│ │ │ │ │ │ │ 1.7.28 and be ... │
│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-64329 │
├──────────────────────────────────┼────────────────┤ │ ├───────────────────┼───────────────┼─────────────────────────────────────────────────────────────┤
│ golang.org/x/crypto │ CVE-2025-47914 │ │ │ v0.41.0 │ 0.45.0 │ SSH Agent servers do not validate the size of messages when │
│ │ │ │ │ │ │ processing... │
│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-47914 │
│ ├────────────────┤ │ │ │ ├─────────────────────────────────────────────────────────────┤
│ │ CVE-2025-58181 │ │ │ │ │ SSH servers parsing GSSAPI authentication requests do not │
│ │ │ │ │ │ │ validate the ... │
│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-58181 │
└──────────────────────────────────┴────────────────┴──────────┴────────┴───────────────────┴───────────────┴─────────────────────────────────────────────────────────────┘ |
Ah, yes, I forgot to merge #9764. Merged now. Thanks. Closing this PR. |
|
Thanks! |
Description
containerd is an open-source container runtime. Versions 0.1.0 through 1.7.28, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4 and 2.2.0-beta.0 through 2.2.0-rc.1 have an overly broad default permission vulnerability. Directory paths /var/lib/containerd, /run/containerd/io.containerd.grpc.v1.cri and /run/containerd/io.containerd.sandbox.controller.v1.shim were all created with incorrect permissions. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. Workarounds include updating system administrator permissions so the host can manually chmod the directories to not have group or world accessible permissions, or to run containerd in rootless mode.
Related issues
Checklist