It was discovered that containerd incorrectly handled file permission
changes. If a user or automated system were tricked into launching a
specially crafted container image, a remote attacker could change
permissions on files on the host filesystem and possibly escalate
privileges.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 21.04 | noarch | containerd | <ย 1.5.2-0ubuntu1~21.04.2 | UNKNOWN |
Ubuntu | 21.04 | noarch | containerd-dbgsym | <ย 1.5.2-0ubuntu1~21.04.2 | UNKNOWN |
Ubuntu | 21.04 | noarch | golang-github-containerd-containerd-dev | <ย 1.5.2-0ubuntu1~21.04.2 | UNKNOWN |
Ubuntu | 20.10 | noarch | containerd | <ย 1.5.2-0ubuntu1~20.10.2 | UNKNOWN |
Ubuntu | 20.10 | noarch | containerd-dbgsym | <ย 1.5.2-0ubuntu1~20.10.2 | UNKNOWN |
Ubuntu | 20.10 | noarch | golang-github-containerd-containerd-dev | <ย 1.5.2-0ubuntu1~20.10.2 | UNKNOWN |
Ubuntu | 20.04 | noarch | containerd | <ย 1.5.2-0ubuntu1~20.04.2 | UNKNOWN |
Ubuntu | 20.04 | noarch | containerd-dbgsym | <ย 1.5.2-0ubuntu1~20.04.2 | UNKNOWN |
Ubuntu | 20.04 | noarch | golang-github-containerd-containerd-dev | <ย 1.5.2-0ubuntu1~20.04.2 | UNKNOWN |
Ubuntu | 20.04 | noarch | golang-github-docker-containerd-dev | <ย 1.5.2-0ubuntu1~20.04.2 | UNKNOWN |