Home

Description

containerd is an open-source container runtime. Versions 0.1.0 through 1.7.28, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4 and 2.2.0-beta.0 through 2.2.0-rc.1 have an overly broad default permission vulnerability. Directory paths `/var/lib/containerd`, `/run/containerd/io.containerd.grpc.v1.cri` and `/run/containerd/io.containerd.sandbox.controller.v1.shim` were all created with incorrect permissions. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. Workarounds include updating system administrator permissions so the host can manually chmod the directories to not have group or world accessible permissions, or to run containerd in rootless mode.

PUBLISHED Reserved 2024-02-08 | Published 2025-11-06 | Updated 2025-11-06 | Assigner GitHub_M




HIGH: 7.3CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Problem types

CWE-279: Incorrect Execution-Assigned Permissions

Product status

< 1.7.29
affected

>= 2.0.0-beta.0, < 2.0.7
affected

>= 2.1.0-beta.0, < 2.1.5
affected

>= 2.2.0-beta.0, < 2.2.0
affected

References

github.com/...ainerd/security/advisories/GHSA-pwhc-rpq9-4c8w

github.com/...ommit/7c59e8e9e970d38061a77b586b23655c352bfec5

github.com/containerd/containerd/blob/main/docs/rootless.md

cve.org (CVE-2024-25621)

nvd.nist.gov (CVE-2024-25621)

Download JSON