Source: containerd
Version: 1.7.24~ds1-6
Severity: grave
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for containerd.

CVE-2024-25621[0]:
| containerd is an open-source container runtime. Versions 0.1.0
| through 1.7.28, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through
| 2.1.4 and 2.2.0-beta.0 through 2.2.0-rc.1 have an overly broad
| default permission vulnerability. Directory paths
| `/var/lib/containerd`, `/run/containerd/io.containerd.grpc.v1.cri`
| and `/run/containerd/io.containerd.sandbox.controller.v1.shim` were
| all created with incorrect permissions. This issue is fixed in
| versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. Workarounds include
| updating system administrator permissions so the host can manually
| chmod the directories to not have group or world accessible
| permissions, or to run containerd in rootless mode.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-25621
    https://www.cve.org/CVERecord?id=CVE-2024-25621
[1] 
https://github.com/containerd/containerd/security/advisories/GHSA-pwhc-rpq9-4c8w
[2] 
https://github.com/containerd/containerd/commit/0450f046e6942e513d0ebf1ef5c2aff13daa187f

Regards,
Salvatore

Reply via email to