Update

USN-7983-1: containerd vulnerabilities

USN-7983-1: containerd vulnerabilities

Publication date: 29 January 2026
Overview: Several security issues were fixed in containerd.

Packages
containerd - open and reliable container runtime library
containerd-app - open and reliable container runtime

Details
David Leadbeater discovered that containerd incorrectly set certain
directory path permissions. An attacker could possibly use this issue to
achieve unauthorised access to the files. (CVE-2024-25621)

It was discovered that containerd did not properly handle the execution
of the goroutine of container attach. An attacker could possibly use this
issue to cause a denial of service. (CVE-2025-64329)

Update instructions
The problem can be corrected by updating your system to the following package versions:

25.10 questing

  • containerd – 2.1.3-0ubuntu3.1
  • golang-github-containerd-containerd-dev – 1.7.24~ds1-8ubuntu1.1

24.04 LTS noble

  • containerd – 1.7.28-0ubuntu1~24.04.2
  • golang-github-containerd-containerd-dev – 1.6.24~ds1-1ubuntu1.3+esm2

22.04 LTS jammy

  • containerd – 1.7.28-0ubuntu1~22.04.1+esm1
  • golang-github-containerd-containerd-dev – 1.6.12-0ubuntu1~22.04.10

20.04 LTS focal

  • containerd – 1.7.24-0ubuntu1~20.04.2+esm1
  • golang-github-containerd-containerd-dev – 1.6.12-0ubuntu1~20.04.8+esm1

18.04 LTS bionic

  • containerd – 1.6.12-0ubuntu1~18.04.1+esm3
  • golang-github-containerd-containerd-dev – 1.6.12-0ubuntu1~18.04.1+esm3

16.04 LTS xenial

  • containerd – 1.2.6-0ubuntu1~16.04.6+esm6
  • golang-github-docker-containerd-dev – 1.2.6-0ubuntu1~16.04.6+esm6
The manufacturer Canonical has not yet set up its devicebase profile. Content such as updates, compatibilities and support may only be maintained with a delay.
Receive Important Update Messages Stay tuned for upcoming Canonical updates

Was the content helpful to you?

Advertisement Advertise here?
Udemy IT certification ad