Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

Search CVE reports


Toggle filters

11 – 18 of 18 results


CVE-2022-23648

Medium priority
Fixed

containerd is a container runtime available as a daemon for Linux and Windows. A bug was found in containerd prior to versions 1.6.1, 1.5.10, and 1.14.12 where containers launched through containerd’s CRI implementation on Linux...

1 affected packages

containerd

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
containerd Fixed Fixed Fixed Fixed
Show less packages

CVE-2021-43816

Low priority

Some fixes available 9 of 11

containerd is an open source container runtime. On installations using SELinux, such as EL8 (CentOS, RHEL), Fedora, or SUSE MicroOS, with containerd since v1.5.0-beta.0 as the backing container runtime interface (CRI), an...

1 affected packages

containerd

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
containerd Fixed Fixed Fixed Fixed Vulnerable
Show less packages

CVE-2021-41190

Low priority

Some fixes available 9 of 18

The OCI Distribution Spec project defines an API protocol to facilitate and standardize the distribution of content. In the OCI Distribution Specification version 1.0.0 and prior, the Content-Type header alone was used to...

3 affected packages

containerd, docker-registry, docker.io

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
containerd Fixed Fixed Fixed Fixed Needs evaluation
docker-registry Not affected Not affected Not affected Not affected Not affected
docker.io Not affected Not affected Not affected Vulnerable Vulnerable
Show less packages

CVE-2021-41103

High priority
Fixed

containerd is an open source container runtime with an emphasis on simplicity, robustness and portability. A bug was found in containerd where container root directories and some plugins had insufficiently restricted permissions,...

1 affected packages

containerd

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
containerd Fixed Fixed Fixed Fixed
Show less packages

CVE-2021-32760

High priority
Fixed

containerd is a container runtime. A bug was found in containerd versions prior to 1.4.8 and 1.5.4 where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in...

1 affected packages

containerd

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
containerd Fixed Fixed Fixed Fixed
Show less packages

CVE-2021-21334

Medium priority

Some fixes available 11 of 12

In containerd (an industry-standard container runtime) before versions 1.3.10 and 1.4.4, containers launched through containerd's CRI implementation (through Kubernetes, crictl, or any other pod/container client that uses the...

1 affected packages

containerd

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
containerd Fixed Fixed Fixed Fixed Vulnerable
Show less packages

CVE-2020-15257

Medium priority
Fixed

containerd is an industry-standard container runtime and is available as a daemon for Linux and Windows. In containerd before versions 1.3.9 and 1.4.3, the containerd-shim API is improperly exposed to host network containers....

1 affected packages

containerd

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
containerd Fixed Fixed Fixed
Show less packages

CVE-2020-15157

Medium priority
Fixed

In containerd (an industry-standard container runtime) before version 1.2.14 there is a credential leaking vulnerability. If a container image manifest in the OCI Image format or Docker Image V2 Schema 2 format includes a URL for...

2 affected packages

containerd, docker.io

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
containerd Not affected Not affected Fixed
docker.io Fixed Fixed Fixed
Show less packages