It was discovered that containerd allows attackers to gain access to read-
only copies of arbitrary files and directories on the host via a specially-
crafted image configuration. An attacker could possibly use this issue to
obtain sensitive information.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 21.10 | noarch | containerd | < 1.5.5-0ubuntu3.1 | UNKNOWN |
Ubuntu | 21.10 | noarch | containerd-dbgsym | < 1.5.5-0ubuntu3.1 | UNKNOWN |
Ubuntu | 21.10 | noarch | golang-github-containerd-containerd-dev | < 1.5.5-0ubuntu3.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | containerd | < 1.5.5-0ubuntu3~20.04.2 | UNKNOWN |
Ubuntu | 20.04 | noarch | containerd-dbgsym | < 1.5.5-0ubuntu3~20.04.2 | UNKNOWN |
Ubuntu | 20.04 | noarch | golang-github-containerd-containerd-dev | < 1.5.5-0ubuntu3~20.04.2 | UNKNOWN |
Ubuntu | 18.04 | noarch | containerd | < 1.5.5-0ubuntu3~18.04.2 | UNKNOWN |
Ubuntu | 18.04 | noarch | containerd-dbgsym | < 1.5.5-0ubuntu3~18.04.2 | UNKNOWN |
Ubuntu | 18.04 | noarch | golang-github-containerd-containerd-dev | < 1.5.5-0ubuntu3~18.04.2 | UNKNOWN |