USN-5012-1: containerd vulnerabilities
20 July 2021
containerd could be made to overwrite file permissions.
Releases
Packages
- containerd - daemon to control runC
Details
It was discovered that containerd incorrectly handled file permission
changes. If a user or automated system were tricked into launching a
specially crafted container image, a remote attacker could change
permissions on files on the host filesystem and possibly escalate
privileges.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 21.04
Ubuntu 20.10
Ubuntu 20.04
Ubuntu 18.04
After a standard system update you need to restart containerd to make
all the necessary changes.
References
Related notices
- USN-5521-1: containerd, golang-github-docker-containerd-dev