USN-5311-2

Source
https://ubuntu.com/security/notices/USN-5311-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5311-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5311-2
Related
Published
2022-05-16T20:48:26.143718Z
Modified
2022-05-16T20:48:26.143718Z
Summary
containerd regression
Details

USN-5311-1 released updates for contained. Unfortunately, a subsequent update reverted the fix for this CVE by mistake. This update corrects the problem.

We apologize for the inconvenience.

Original advisory details:

It was discovered that containerd allows attackers to gain access to read- only copies of arbitrary files and directories on the host via a specially- crafted image configuration. An attacker could possibly use this issue to obtain sensitive information.

References

Affected packages

Ubuntu:20.04:LTS / containerd

Package

Name
containerd
Purl
pkg:deb/ubuntu/containerd?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.9-0ubuntu1~20.04.4

Affected versions

1.*

1.2.10-0ubuntu1
1.3.2-0ubuntu1
1.3.3-0ubuntu1
1.3.3-0ubuntu2
1.3.3-0ubuntu2.1
1.3.3-0ubuntu2.2
1.3.3-0ubuntu2.3
1.4.4-0ubuntu1~20.04.2
1.5.2-0ubuntu1~20.04.1
1.5.2-0ubuntu1~20.04.2
1.5.2-0ubuntu1~20.04.3
1.5.5-0ubuntu3~20.04.1
1.5.5-0ubuntu3~20.04.2
1.5.9-0ubuntu1~20.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "1.5.9-0ubuntu1~20.04.4",
            "binary_name": "containerd"
        },
        {
            "binary_version": "1.5.9-0ubuntu1~20.04.4",
            "binary_name": "containerd-dbgsym"
        },
        {
            "binary_version": "1.5.9-0ubuntu1~20.04.4",
            "binary_name": "golang-github-containerd-containerd-dev"
        }
    ]
}