Bug 2367631 (CVE-2025-47290) - CVE-2025-47290 containerd: Containerd vulnerable to host filesystem access during image unpack
Summary: CVE-2025-47290 containerd: Containerd vulnerable to host filesystem access du...
Keywords:
Status: NEW
Alias: CVE-2025-47290
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2367665 2367666
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-05-20 19:01 UTC by OSIDB Bzimport
Modified: 2025-05-30 12:48 UTC (History)
64 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-05-20 19:01:06 UTC
containerd is a container runtime. A time-of-check to time-of-use (TOCTOU) vulnerability was found in containerd v2.1.0. While unpacking an image during an image pull, specially crafted container images could arbitrarily modify the host file system. The only affected version of containerd is 2.1.0.  Other versions of containerd are not affected. This bug has been fixed in containerd 2.1.1. Users should update to this version to resolve the issue. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.


Note You need to log in before you can comment on or make changes to this bug.