containerd is an open-source container runtime. Versions 0.1.0 through 1.7.28, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4 and 2.2.0-beta.0 through 2.2.0-rc.1 have an overly broad default permission vulnerability. Directory paths `/var/lib/containerd`, `/run/containerd/io.containerd.grpc.v1.cri` and `/run/containerd/io.containerd.sandbox.controller.v1.shim` were all created with incorrect permissions. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. Workarounds include updating system administrator permissions so the host can manually chmod the directories to not have group or world accessible permissions, or to run containerd in rootless mode.
History

Thu, 06 Nov 2025 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Linuxfoundation
Linuxfoundation containerd
Vendors & Products Linuxfoundation
Linuxfoundation containerd

Thu, 06 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 06 Nov 2025 18:45:00 +0000

Type Values Removed Values Added
Description containerd is an open-source container runtime. Versions 0.1.0 through 1.7.28, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4 and 2.2.0-beta.0 through 2.2.0-rc.1 have an overly broad default permission vulnerability. Directory paths `/var/lib/containerd`, `/run/containerd/io.containerd.grpc.v1.cri` and `/run/containerd/io.containerd.sandbox.controller.v1.shim` were all created with incorrect permissions. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. Workarounds include updating system administrator permissions so the host can manually chmod the directories to not have group or world accessible permissions, or to run containerd in rootless mode.
Title containerd affected by a local privilege escalation via wide permissions on CRI directory
Weaknesses CWE-279
References
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-11-06T18:36:21.566Z

Updated: 2025-11-06T19:35:13.415Z

Reserved: 2024-02-08T22:26:33.511Z

Link: CVE-2024-25621

cve-icon Vulnrichment

Updated: 2025-11-06T19:35:07.716Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-06T19:15:40.090

Modified: 2025-11-06T19:45:09.883

Link: CVE-2024-25621

cve-icon Redhat

No data.