Bug 2367631 (CVE-2025-47290)

Summary: CVE-2025-47290 containerd: Containerd vulnerable to host filesystem access during image unpack
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: adudiak, alcohan, anjoseph, aprice, bdettelb, caswilli, crizzo, dfreiber, dhanak, doconnor, drow, dsimansk, dymurray, eglynn, fdeutsch, gparvin, jburrell, jcantril, jjoyce, jmatthew, jprabhak, jsamir, jschluet, jwendell, kaycoth, kingland, kshier, kverlaen, lgamliel, lhh, ljawale, lsvaty, luizcosta, matzew, mburns, mgarciac, mnovotny, njean, nweather, oezr, omaciel, oramraz, owatkins, pahickey, periklis, pgrist, rbobbitt, rcernich, rfreiman, rhaigner, rjohnson, rojacob, sausingh, smullick, stcannon, sthirugn, stirabos, teagle, thason, vkrizan, vkumar, whayutin, wtam, yguenane
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in containerd. This vulnerability allows arbitrary modification of the host file system via a time-of-check to time-of-use (TOCTOU) race condition that occurs during image unpacking. Specifically, when pulling and unpacking a specially crafted container image, an attacker could exploit the window between validation and use of file paths to perform unauthorized file system operations on the host. Successful exploitation requires the attacker to supply a malicious image and may require elevated privileges.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2367665, 2367666    
Bug Blocks:    

Description OSIDB Bzimport 2025-05-20 19:01:06 UTC
containerd is a container runtime. A time-of-check to time-of-use (TOCTOU) vulnerability was found in containerd v2.1.0. While unpacking an image during an image pull, specially crafted container images could arbitrarily modify the host file system. The only affected version of containerd is 2.1.0.  Other versions of containerd are not affected. This bug has been fixed in containerd 2.1.1. Users should update to this version to resolve the issue. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.