OESA-2025-2836

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-2836
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-2836.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2025-2836
Upstream
Published
2025-12-12T12:20:53Z
Modified
2025-12-12T12:44:53.166118Z
Summary
containerd security update
Details

containerd is an industry-standard container runtime with an emphasis on simplicity, robustness and portability. It is available as a daemon for Linux and Windows, which can manage the complete container lifecycle of its host system: image transfer and storage, container execution and supervision, low-level storage and network attachments, etc.

Security Fix(es):

containerd is an open-source container runtime. Versions 0.1.0 through 1.7.28, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4 and 2.2.0-beta.0 through 2.2.0-rc.1 have an overly broad default permission vulnerability. Directory paths /var/lib/containerd, /run/containerd/io.containerd.grpc.v1.cri and /run/containerd/io.containerd.sandbox.controller.v1.shim were all created with incorrect permissions. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. Workarounds include updating system administrator permissions so the host can manually chmod the directories to not have group or world accessible permissions, or to run containerd in rootless mode.(CVE-2024-25621)

containerd is an open-source container runtime. Versions 1.7.28 and below, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4, and 2.2.0-beta.0 through 2.2.0-rc.1 contain a bug in the CRI Attach implementation where a user can exhaust memory on the host due to goroutine leaks. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. To workaround this vulnerability, users can set up an admission controller to control accesses to pods/attach resources.(CVE-2025-64329)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:20.03-LTS-SP4 / containerd

Package

Name
containerd
Purl
pkg:rpm/openEuler/containerd&distro=openEuler-20.03-LTS-SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.0-222.oe2003sp4

Ecosystem specific

{
    "aarch64": [
        "containerd-1.2.0-222.oe2003sp4.aarch64.rpm"
    ],
    "src": [
        "containerd-1.2.0-222.oe2003sp4.src.rpm"
    ],
    "x86_64": [
        "containerd-1.2.0-222.oe2003sp4.x86_64.rpm"
    ]
}

Database specific

source

"https://repo.openeuler.org/security/data/osv/OESA-2025-2836.json"