CVE-2024-25621
Publication date 6 November 2025
Last updated 29 January 2026
Ubuntu priority
Cvss 3 Severity Score
Description
containerd is an open-source container runtime. Versions 0.1.0 through 1.7.28, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4 and 2.2.0-beta.0 through 2.2.0-rc.1 have an overly broad default permission vulnerability. Directory paths `/var/lib/containerd`, `/run/containerd/io.containerd.grpc.v1.cri` and `/run/containerd/io.containerd.sandbox.controller.v1.shim` were all created with incorrect permissions. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. Workarounds include updating system administrator permissions so the host can manually chmod the directories to not have group or world accessible permissions, or to run containerd in rootless mode.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| containerd | 25.10 questing |
Fixed 1.7.24~ds1-8ubuntu1.1
|
| 24.04 LTS noble |
Fixed 1.6.24~ds1-1ubuntu1.3+esm2
|
|
| 22.04 LTS jammy |
Fixed 1.6.12-0ubuntu1~22.04.10
|
|
| 20.04 LTS focal |
Fixed 1.6.12-0ubuntu1~20.04.8+esm1
|
|
| 18.04 LTS bionic |
Fixed 1.6.12-0ubuntu1~18.04.1+esm3
|
|
| 16.04 LTS xenial |
Fixed 1.2.6-0ubuntu1~16.04.6+esm6
|
|
| containerd-app | 25.10 questing |
Fixed 2.1.3-0ubuntu3.1
|
| 24.04 LTS noble |
Fixed 1.7.28-0ubuntu1~24.04.2
|
|
| 22.04 LTS jammy |
Fixed 1.7.28-0ubuntu1~22.04.1+esm1
|
|
| 20.04 LTS focal |
Fixed 1.7.24-0ubuntu1~20.04.2+esm1
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu Pro 30-day free trialNotes
alexmurray
Traditionally the containerd source package contained both the library and docker application. However, in releases that contain the containerd-app source package, the containerd source package contains only the library whilst the docker application itself is contained in the containerd-app package.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Local |
| Attack complexity | Low |
| Privileges required | Low |
| User interaction | Required |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | High |
| Availability impact | High |
| Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-7983-1
- containerd vulnerabilities
- 29 January 2026