USN-7983-1: containerd vulnerabilities
USN-7983-1: containerd vulnerabilities
Publication date: 29 January 2026
Overview: Several security issues were fixed in containerd.
Packages
containerd - open and reliable container runtime library
containerd-app - open and reliable container runtime
Details
David Leadbeater discovered that containerd incorrectly set certain
directory path permissions. An attacker could possibly use this issue to
achieve unauthorised access to the files. (CVE-2024-25621)
It was discovered that containerd did not properly handle the execution
of the goroutine of container attach. An attacker could possibly use this
issue to cause a denial of service. (CVE-2025-64329)
Update instructions
The problem can be corrected by updating your system to the following package versions:
25.10 questing
- containerd – 2.1.3-0ubuntu3.1
- golang-github-containerd-containerd-dev – 1.7.24~ds1-8ubuntu1.1
24.04 LTS noble
- containerd – 1.7.28-0ubuntu1~24.04.2
- golang-github-containerd-containerd-dev – 1.6.24~ds1-1ubuntu1.3+esm2
22.04 LTS jammy
- containerd – 1.7.28-0ubuntu1~22.04.1+esm1
- golang-github-containerd-containerd-dev – 1.6.12-0ubuntu1~22.04.10
20.04 LTS focal
- containerd – 1.7.24-0ubuntu1~20.04.2+esm1
- golang-github-containerd-containerd-dev – 1.6.12-0ubuntu1~20.04.8+esm1
18.04 LTS bionic
- containerd – 1.6.12-0ubuntu1~18.04.1+esm3
- golang-github-containerd-containerd-dev – 1.6.12-0ubuntu1~18.04.1+esm3
16.04 LTS xenial
- containerd – 1.2.6-0ubuntu1~16.04.6+esm6
- golang-github-docker-containerd-dev – 1.2.6-0ubuntu1~16.04.6+esm6

