{"id":"CVE-2024-25621","summary":"containerd affected by a local privilege escalation via wide permissions on CRI directory","details":"containerd is an open-source container runtime. Versions 0.1.0 through 1.7.28, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4 and 2.2.0-beta.0 through 2.2.0-rc.1 have an overly broad default permission vulnerability. Directory paths `/var/lib/containerd`, `/run/containerd/io.containerd.grpc.v1.cri` and `/run/containerd/io.containerd.sandbox.controller.v1.shim` were all created with incorrect permissions. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. Workarounds include updating system administrator permissions so the host can manually chmod the directories to not have group or world accessible permissions, or to run containerd in rootless mode.","aliases":["GHSA-pwhc-rpq9-4c8w","GO-2025-4100"],"modified":"2026-04-10T05:10:14.719729Z","published":"2025-11-06T18:36:21.566Z","related":["CGA-xqcg-j7rr-43xj","MGASA-2026-0030","SUSE-SU-2025:21042-1","SUSE-SU-2025:21057-1","SUSE-SU-2025:4072-1","SUSE-SU-2025:4288-1","openSUSE-SU-2025:15726-1"],"database_specific":{"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/25xxx/CVE-2024-25621.json","cwe_ids":["CWE-279"]},"references":[{"type":"WEB","url":"https://github.com/containerd/containerd/blob/main/docs/rootless.md"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/25xxx/CVE-2024-25621.json"},{"type":"ADVISORY","url":"https://github.com/containerd/containerd/security/advisories/GHSA-pwhc-rpq9-4c8w"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-25621"},{"type":"FIX","url":"https://github.com/containerd/containerd/commit/7c59e8e9e970d38061a77b586b23655c352bfec5"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/containerd/containerd","events":[{"introduced":"0"},{"fixed":"442cb34bda9a6a0fed82a2ca7cade05c5c749582"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.7.29"}]}},{"type":"GIT","repo":"https://github.com/containerd/containerd","events":[{"introduced":"de55dfc0f184aa6ed19de4dc02a3a4bae3476c88"},{"fixed":"4ac6c20c7bbf8177f29e46bbdc658fec02ffb8ad"}],"database_specific":{"versions":[{"introduced":"2.0.0-beta.0"},{"fixed":"2.0.7"}]}},{"type":"GIT","repo":"https://github.com/containerd/containerd","events":[{"introduced":"b430e5ac3accf636cf52b0128b27bb828574cbcf"},{"fixed":"fcd43222d6b07379a4be9786bda52438f0dd16a1"}],"database_specific":{"versions":[{"introduced":"2.1.0-beta.0"},{"fixed":"2.1.5"}]}},{"type":"GIT","repo":"https://github.com/containerd/containerd","events":[{"introduced":"5bcf77a55038ad658c57fdecc48af54935a0d42f"},{"fixed":"1c4457e00facac03ce1d75f7b6777a7a851e5c41"}],"database_specific":{"versions":[{"introduced":"2.2.0-beta.0"},{"fixed":"2.2.0"}]}}],"versions":["0.0.2","0.0.3","0.0.4","0.0.5","api/v1.10.0","api/v1.10.0-beta.0","api/v1.10.0-beta.1","api/v1.10.0-rc.0","api/v1.6.0-beta.1","api/v1.6.0-beta.2","api/v1.6.0-beta.3","api/v1.7.19","api/v1.8.0","api/v1.8.0-rc.0","api/v1.8.0-rc.1","api/v1.8.0-rc.2","api/v1.8.0-rc.3","api/v1.8.0-rc.4","api/v1.9.0","api/v1.9.0-rc.0","v0.2.0","v1.0.0","v1.0.0-alpha0","v1.0.0-alpha1","v1.0.0-alpha2","v1.0.0-alpha3","v1.0.0-alpha4","v1.0.0-alpha5","v1.0.0-alpha6","v1.0.0-beta.0","v1.0.0-beta.1","v1.0.0-beta.2","v1.0.0-beta.3","v1.0.0-rc.0","v1.1.0","v1.1.0-rc.0","v1.1.0-rc.1","v1.1.0-rc.2","v1.2.0","v1.2.0-beta.0","v1.2.0-beta.1","v1.2.0-beta.2","v1.2.0-rc.0","v1.2.0-rc.1","v1.2.0-rc.2","v1.3.0","v1.3.0-beta.0","v1.3.0-beta.1","v1.3.0-beta.2","v1.3.0-rc.0","v1.3.0-rc.1","v1.3.0-rc.2","v1.3.0-rc.3","v1.4.0","v1.4.0-beta.0","v1.4.0-beta.1","v1.4.0-beta.2","v1.4.0-rc.0","v1.4.0-rc.1","v1.5.0","v1.5.0-beta.0","v1.5.0-beta.1","v1.5.0-beta.2","v1.5.0-beta.3","v1.5.0-beta.4","v1.5.0-rc.0","v1.5.0-rc.1","v1.5.0-rc.2","v1.5.0-rc.3","v1.6.0","v1.6.0-beta.0","v1.6.0-beta.1","v1.6.0-beta.2","v1.6.0-beta.3","v1.6.0-beta.4","v1.6.0-beta.5","v1.6.0-rc.0","v1.6.0-rc.1","v1.6.0-rc.2","v1.6.0-rc.3","v1.6.0-rc.4","v1.7.0","v1.7.0-beta.0","v1.7.0-beta.1","v1.7.0-beta.2","v1.7.0-beta.3","v1.7.0-beta.4","v1.7.0-rc.0","v1.7.0-rc.1","v1.7.0-rc.2","v1.7.0-rc.3","v1.7.1","v1.7.10","v1.7.11","v1.7.12","v1.7.13","v1.7.14","v1.7.15","v1.7.16","v1.7.17","v1.7.18","v1.7.19","v1.7.2","v1.7.20","v1.7.21","v1.7.22","v1.7.23","v1.7.24","v1.7.25","v1.7.26","v1.7.27","v1.7.28","v1.7.3","v1.7.4","v1.7.5","v1.7.6","v1.7.7","v1.7.8","v1.7.9","v2.0.0","v2.0.0-beta.0","v2.0.0-beta.1","v2.0.0-beta.2","v2.0.0-rc.0","v2.0.0-rc.1","v2.0.0-rc.2","v2.0.0-rc.3","v2.0.0-rc.4","v2.0.0-rc.5","v2.0.0-rc.6","v2.0.1","v2.0.2","v2.0.3","v2.0.4","v2.0.5","v2.0.6","v2.1.0","v2.1.0-beta.0","v2.1.0-beta.1","v2.1.0-rc.0","v2.1.0-rc.1","v2.1.1","v2.1.2","v2.1.3","v2.1.4","v2.2.0-beta.0","v2.2.0-beta.1","v2.2.0-beta.2","v2.2.0-rc.0","v2.2.0-rc.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-25621.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"}]}