Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-pwhc-rpq9-4c8w | containerd affected by a local privilege escalation via wide permissions on CRI directory |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 06 Nov 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linuxfoundation
Linuxfoundation containerd |
|
| Vendors & Products |
Linuxfoundation
Linuxfoundation containerd |
Thu, 06 Nov 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 06 Nov 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | containerd is an open-source container runtime. Versions 0.1.0 through 1.7.28, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4 and 2.2.0-beta.0 through 2.2.0-rc.1 have an overly broad default permission vulnerability. Directory paths `/var/lib/containerd`, `/run/containerd/io.containerd.grpc.v1.cri` and `/run/containerd/io.containerd.sandbox.controller.v1.shim` were all created with incorrect permissions. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. Workarounds include updating system administrator permissions so the host can manually chmod the directories to not have group or world accessible permissions, or to run containerd in rootless mode. | |
| Title | containerd affected by a local privilege escalation via wide permissions on CRI directory | |
| Weaknesses | CWE-279 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-06T19:35:13.415Z
Reserved: 2024-02-08T22:26:33.511Z
Link: CVE-2024-25621
Updated: 2025-11-06T19:35:07.716Z
Status : Awaiting Analysis
Published: 2025-11-06T19:15:40.090
Modified: 2025-11-06T19:45:09.883
Link: CVE-2024-25621
No data.
OpenCVE Enrichment
Updated: 2025-11-06T20:38:13Z
Github GHSA