USN-5311-2

See a problem?
Source
https://ubuntu.com/security/notices/USN-5311-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/USN-5311-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5311-2
Related
Published
2022-05-16T20:48:26.143718Z
Modified
2022-05-16T20:48:26.143718Z
Summary
containerd regression
Details

USN-5311-1 released updates for contained. Unfortunately, a subsequent update reverted the fix for this CVE by mistake. This update corrects the problem.

We apologize for the inconvenience.

Original advisory details:

It was discovered that containerd allows attackers to gain access to read- only copies of arbitrary files and directories on the host via a specially- crafted image configuration. An attacker could possibly use this issue to obtain sensitive information.

References

Affected packages

Ubuntu:20.04:LTS / containerd

Package

Name
containerd

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.9-0ubuntu1~20.04.4

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "golang-github-containerd-containerd-dev": "1.5.9-0ubuntu1~20.04.4",
            "containerd": "1.5.9-0ubuntu1~20.04.4"
        }
    ]
}