The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade github.com/containerd/containerd/v2/plugins/cri/runtime to version 2.0.7, 2.1.5, 2.2.0 or higher.
Affected versions of this package are vulnerable to Incorrect Execution-Assigned Permissions when initialising host directories with 711 and 755 permissions instead of 700. An attacker can gain unauthorized access to sensitive data and potentially escalate privileges by accessing directories with insufficiently restrictive permissions. This is only exploitable if a local user has access to the host system where the affected directories are present.
This vulnerability can be mitigated by manually setting the permissions of the affected directories (/var/lib/containerd, /run/containerd/io.containerd.grpc.v1.cri, /run/containerd/io.containerd.sandbox.controller.v1.shim, temp in the daemon configuration) to 700 or by running the process in rootless mode.