OESA-2025-2756

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-2756
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-2756.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2025-2756
Upstream
Published
2025-11-28T12:51:25Z
Modified
2025-11-28T13:17:35.452677Z
Summary
containerd security update
Details

containerd is an industry-standard container runtime with an emphasis on simplicity, robustness and portability. It is available as a daemon for Linux and Windows, which can manage the complete container lifecycle of its host system: image transfer and storage, container execution and supervision, low-level storage and network attachments, etc.

Security Fix(es):

An overly broad default permission vulnerability was found in containerd.

  • /var/lib/containerd was created with the permission bits 0o711, while it should be created with 0o700
    • Allowed local users on the host to potentially access the metadata store and the content store
  • /run/containerd/io.containerd.grpc.v1.cri was created with 0o755, while it should be created with 0o700
    • Allowed local users on the host to potentially access the contents of Kubernetes local volumes. The contents of volumes might include setuid binaries, which could allow a local user on the host to elevate privileges on the host.
  • /run/containerd/io.containerd.sandbox.controller.v1.shim was created with 0o711, while it should be created with 0o700

The directory paths may differ depending on the daemon configuration. When the temp directory path is specified in the daemon configuration, that directory was also created with 0o711, while it should be created with 0o700.(CVE-2024-25621)

A bug was found in containerd's CRI Attach implementation where a user can exhaust memory on the host due to goroutine leaks. Repetitive calls of CRI Attach (e.g., kubectl attach) could increase the memory usage of containerd.(CVE-2025-64329)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:22.03-LTS-SP3 / containerd

Package

Name
containerd
Purl
pkg:rpm/openEuler/containerd&distro=openEuler-22.03-LTS-SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.0-324.oe2203sp3

Ecosystem specific

{
    "src": [
        "containerd-1.2.0-324.oe2203sp3.src.rpm"
    ],
    "aarch64": [
        "containerd-1.2.0-324.oe2203sp3.aarch64.rpm"
    ],
    "x86_64": [
        "containerd-1.2.0-324.oe2203sp3.x86_64.rpm"
    ]
}