kubernetes-oomkill-exporter
kubernetes-oomkill-exporter copied to clipboard
Renovate: Update module github.com/containerd/containerd to v1.7.29 [SECURITY]
This PR contains the following updates:
| Package | Change | Age | Adoption | Passing | Confidence |
|---|---|---|---|---|---|
| github.com/containerd/containerd | v1.7.27 -> v1.7.29 |
GitHub Vulnerability Alerts
CVE-2024-25621
Impact
An overly broad default permission vulnerability was found in containerd.
/var/lib/containerdwas created with the permission bits 0o711, while it should be created with 0o700- Allowed local users on the host to potentially access the metadata store and the content store
/run/containerd/io.containerd.grpc.v1.criwas created with 0o755, while it should be created with 0o700- Allowed local users on the host to potentially access the contents of Kubernetes local volumes. The contents of volumes might include setuid binaries, which could allow a local user on the host to elevate privileges on the host.
/run/containerd/io.containerd.sandbox.controller.v1.shimwas created with 0o711, while it should be created with 0o700
The directory paths may differ depending on the daemon configuration.
When the temp directory path is specified in the daemon configuration, that directory was also created with 0o711, while it should be created with 0o700.
Patches
This bug has been fixed in the following containerd versions:
- 2.2.0
- 2.1.5
- 2.0.7
- 1.7.29
Users should update to these versions to resolve the issue. These updates automatically change the permissions of the existing directories.
[!NOTE]
/run/containerdand/run/containerd/io.containerd.runtime.v2.taskare still created with 0o711. This is an expected behavior for supporting userns-remapped containers.
Workarounds
The system administrator on the host can manually chmod the directories to not have group or world accessible permisisons:
chmod 700 /var/lib/containerd
chmod 700 /run/containerd/io.containerd.grpc.v1.cri
chmod 700 /run/containerd/io.containerd.sandbox.controller.v1.shim
An alternative mitigation would be to run containerd in rootless mode.
Credits
The containerd project would like to thank David Leadbeater for responsibly disclosing this issue in accordance with the containerd security policy.
For more information
If you have any questions or comments about this advisory:
- Open an issue in containerd
- Email us at [email protected]
To report a security issue in containerd:
CVE-2025-64329
Impact
A bug was found in containerd's CRI Attach implementation where a user can exhaust memory on the host due to goroutine leaks.
Repetitive calls of CRI Attach (e.g., kubectl attach) could increase the memory usage of containerd.
Patches
This bug has been fixed in the following containerd versions:
- 2.2.0
- 2.1.5
- 2.0.7
- 1.7.29
Users should update to these versions to resolve the issue.
Workarounds
Set up an admission controller to control accesses to pods/attach resources.
e.g., Validating Admission Policy.
Credits
The containerd project would like to thank @Wheat2018 for responsibly disclosing this issue in accordance with the containerd security policy.
References
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64329
For more information
If you have any questions or comments about this advisory:
- Open an issue in containerd
- Email us at [email protected]
To report a security issue in containerd:
containerd affected by a local privilege escalation via wide permissions on CRI directory
CVE-2024-25621 / GHSA-pwhc-rpq9-4c8w
More information
Details
Impact
An overly broad default permission vulnerability was found in containerd.
/var/lib/containerdwas created with the permission bits 0o711, while it should be created with 0o700- Allowed local users on the host to potentially access the metadata store and the content store
/run/containerd/io.containerd.grpc.v1.criwas created with 0o755, while it should be created with 0o700- Allowed local users on the host to potentially access the contents of Kubernetes local volumes. The contents of volumes might include setuid binaries, which could allow a local user on the host to elevate privileges on the host.
/run/containerd/io.containerd.sandbox.controller.v1.shimwas created with 0o711, while it should be created with 0o700
The directory paths may differ depending on the daemon configuration.
When the temp directory path is specified in the daemon configuration, that directory was also created with 0o711, while it should be created with 0o700.
Patches
This bug has been fixed in the following containerd versions:
- 2.2.0
- 2.1.5
- 2.0.7
- 1.7.29
Users should update to these versions to resolve the issue. These updates automatically change the permissions of the existing directories.
[!NOTE]
/run/containerdand/run/containerd/io.containerd.runtime.v2.taskare still created with 0o711. This is an expected behavior for supporting userns-remapped containers.
Workarounds
The system administrator on the host can manually chmod the directories to not have group or world accessible permisisons:
chmod 700 /var/lib/containerd
chmod 700 /run/containerd/io.containerd.grpc.v1.cri
chmod 700 /run/containerd/io.containerd.sandbox.controller.v1.shim
An alternative mitigation would be to run containerd in rootless mode.
Credits
The containerd project would like to thank David Leadbeater for responsibly disclosing this issue in accordance with the containerd security policy.
For more information
If you have any questions or comments about this advisory:
- Open an issue in containerd
- Email us at [email protected]
To report a security issue in containerd:
Severity
- CVSS Score: 7.3 / 10 (High)
- Vector String:
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
References
- https://github.com/containerd/containerd/security/advisories/GHSA-pwhc-rpq9-4c8w
- https://nvd.nist.gov/vuln/detail/CVE-2024-25621
- https://github.com/containerd/containerd/commit/7c59e8e9e970d38061a77b586b23655c352bfec5
- https://github.com/containerd/containerd
- https://github.com/containerd/containerd/blob/main/docs/rootless.md
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
containerd CRI server: Host memory exhaustion through Attach goroutine leak
CVE-2025-64329 / GHSA-m6hq-p25p-ffr2
More information
Details
Impact
A bug was found in containerd's CRI Attach implementation where a user can exhaust memory on the host due to goroutine leaks.
Repetitive calls of CRI Attach (e.g., kubectl attach) could increase the memory usage of containerd.
Patches
This bug has been fixed in the following containerd versions:
- 2.2.0
- 2.1.5
- 2.0.7
- 1.7.29
Users should update to these versions to resolve the issue.
Workarounds
Set up an admission controller to control accesses to pods/attach resources.
e.g., Validating Admission Policy.
Credits
The containerd project would like to thank @Wheat2018 for responsibly disclosing this issue in accordance with the containerd security policy.
References
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64329
For more information
If you have any questions or comments about this advisory:
- Open an issue in containerd
- Email us at [email protected]
To report a security issue in containerd:
Severity
- CVSS Score: 6.9 / 10 (Medium)
- Vector String:
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
References
- https://github.com/containerd/containerd/security/advisories/GHSA-m6hq-p25p-ffr2
- https://nvd.nist.gov/vuln/detail/CVE-2025-64329
- https://github.com/containerd/containerd/commit/083b53cd6f19b5de7717b0ce92c11bdf95e612df
- https://github.com/containerd/containerd
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Release Notes
containerd/containerd (github.com/containerd/containerd)
v1.7.29: containerd 1.7.29
Welcome to the v1.7.29 release of containerd!
The twenty-ninth patch release for containerd 1.7 contains various fixes and updates including security patches.
Security Updates
-
containerd
-
runc
Highlights
Image Distribution
- Update differ to handle zstd media types (#12018)
Runtime
Please try out the release binaries and report any issues at https://github.com/containerd/containerd/issues.
Contributors
- Derek McGowan
- Akihiro Suda
- Phil Estes
- Austin Vazquez
- Sebastiaan van Stijn
- ningmingxiao
- Maksym Pavlenko
- StepSecurity Bot
- wheat2018
Changes
38 commits
442cb34bdMerge commit from fork0450f046eFix directory permissionse5cb6ddb7Merge commit from forkc575d1b5ffix goroutine leak of container Attach- Prepare release notes for v1.7.29 (#12486)
1fc2daaf3Prepare release notes for v1.7.29
- Update runc binary to v1.3.3 (#12480)
3f5f9f872runc: Update runc binary to v1.3.3
- Update GHA images and bump Go 1.24.9; 1.25.3 (#12471)
667409fb6ci: bump Go 1.24.9, 1.25.3294f8c027Update GHA runners to use latest images for basic binaries buildcf66b4141Update GHA runners to use latest image for most jobsfa3e6fa18pkg/epoch: extract parsing SOURCE_DATE_EPOCH to a functionac334bffcpkg/epoch: fix tests on macOSd04b8721fpkg/epoch: replace some fmt.Sprintfs with strconv
- CI: update Fedora to 43 (#12450)
5cfedbf52CI: update Fedora to 43
- CI: skip ubuntu-24.04-arm on private repos (#12429)
cf99a012dCI: skip ubuntu-24.04-arm on private repos
- runc:Update runc binary to v1.3.1 (#12276)
4c77b8d07runc:Update runc binary to v1.3.1
- Fix lost container logs from quickly closing io (#12375)
d30024db2bugfix:fix container logs lost because io close too quickly
- ci: bump Go 1.24.8 (#12362)
f4b3d96f3ci: bump Go 1.24.8334fd8e4bupdate golangci-lint to v1.64.28a67abc4cDrop inactivated linter exportlooprefe4dbf08f0build(deps): bump golangci/golangci-lint-action from 6.3.2 to 6.5.0d7db2ba06build(deps): bump golangci/golangci-lint-action from 6.2.0 to 6.3.2d7182888fbuild(deps): bump golangci/golangci-lint-action from 6.1.1 to 6.2.04be6c7e3bbuild(deps): bump actions/cache from 4.1.2 to 4.2.0a2e097e86build(deps): bump actions/checkout from 4.2.1 to 4.2.26de404d11build(deps): bump actions/cache from 4.1.1 to 4.1.2038a25584[StepSecurity] ci: Harden GitHub Actions
- Update differ to handle zstd media types (#12018)
eaeb4b6acUpdate differ to handle zstd media types
- ci: bump Go 1.23.12, 1.24.6 (#12188)
83c535339ci: bump Go 1.23.12, 1.24.6
Dependency Changes
This release has no dependency changes
Previous release can be found at v1.7.28
v1.7.28: containerd 1.7.28
Welcome to the v1.7.28 release of containerd!
The twenty-eighth patch release for containerd 1.7 contains various fixes and updates.
Highlights
Image Distribution
- Refresh OAuth tokens when they expire during registry operations (#11721)
- Set default differ for the default unpack config of transfer service (#11689)
Runtime
- Update runc binary to v1.3.0 (#11800)
- Remove invalid error log when stopping container after containerd restart (#11620)
Please try out the release binaries and report any issues at https://github.com/containerd/containerd/issues.
Contributors
- Akhil Mohan
- Akihiro Suda
- Austin Vazquez
- Maksym Pavlenko
- Phil Estes
- Derek McGowan
- Kirtana Ashok
- Henry Wang
- Iain Macdonald
- Jin Dong
- Swagat Bora
- Wei Fu
- Yang Yang
- madraceee
Changes
57 commits
- Prepare release notes for v1.7.28 (#12134)
b01b809f8Prepare release notes for v1.7.28
- ci: bump Go 1.23.11, 1.24.5 (#12117)
ce2373176ci: bump Go 1.23.11, 1.24.5
- Backport windows test fixes (#12121)
- ci: use fedora 39 archive (#12123)
6d7e021cfci: use fedora/39-cloud-base image from archive
- update runners to ubuntu 24.04 (#11802)
- go.mod: golang.org/x/* latest (#12096)
da5d1a371go.mod: golang.org/x/* latest
- Remove additional fuzzers from instrumentation repo (#12099)
5fef123baRemove additional fuzzers from CI
- backport windows runner and golang toolchain updates (#11972)
- test: added runc v1 tests using vagrant (#11896)
60e73122ctest: added runc v1 tests using vagrant
- Revert "disable portmap test in ubuntu-22 to make CI happy" (#11803)
- Update runc binary to v1.3.0 (#11800)
b001469c7Update runc binary to v1.3.0
- Refresh OAuth tokens when they expire during registry operations (#11721)
a6421da84remotes/docker/authorizer.go: invalidate auth tokens when they expire.
- [CI] Fix vagrant (#11739)
effc49e8bFix vagrant setup
- Fix CI (#11722)
d3e7dd716Skip criu on Arms7cf9ebe94Disable port mapping tests in CRI-in-UserNS42657a4eddisable portmap test in ubuntu-22 to make CI happyb300fd37badd option to skip tests in critest6f4ffad27Address cgroup mountpoint does not existcef298331Update Ubuntu to 242dd9be16eci: update GitHub Actions release runner to ubuntu-24.04
- Set default differ for the default unpack config of transfer service (#11689)
e40e59e4eSet default differ for the default unpack config of transfer service
- silence govulncheck false positives (#11679)
ff097d5a4silence govulncheck false positives
- vendor: github.com/go-jose/go-jose/v3 v3.0.4 (#11619)
52dd4dc51vendor: github.com/go-jose/go-jose/v3 v3.0.4
- Remove invalid error log when stopping container after containerd restart (#11620)
24f41d2d5use shimCtx for fifo copy
- Update runc binary to v1.2.6 (#11584)
1e1e78ad7Update runc binary to v1.2.6
- Use RWMutex in NSMap and reduce lock area (#11556)
9a8d1d44aUse RWMutex in NSMap and reduce lock area
Dependency Changes
- github.com/go-jose/go-jose/v3 v3.0.3 -> v3.0.4
- golang.org/x/crypto v0.31.0 -> v0.40.0
- golang.org/x/mod v0.17.0 -> v0.26.0
- golang.org/x/net v0.33.0 -> v0.42.0
- golang.org/x/oauth2 v0.11.0 -> v0.30.0
- golang.org/x/sync v0.10.0 -> v0.16.0
- golang.org/x/sys v0.28.0 -> v0.34.0
- golang.org/x/term v0.27.0 -> v0.33.0
- golang.org/x/text v0.21.0 -> v0.27.0
- golang.org/x/time
90d013b-> v0.12.0
Previous release can be found at v1.7.27
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
- [ ] If you want to rebase/retry this PR, check this box
This PR was generated by Mend Renovate. View the repository job log.
ℹ Artifact update notice
File name: go.mod
In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):
- 4 additional dependencies were updated
Details:
| Package | Change |
|---|---|
golang.org/x/net |
v0.40.0 -> v0.42.0 |
golang.org/x/sync |
v0.14.0 -> v0.16.0 |
golang.org/x/sys |
v0.33.0 -> v0.34.0 |
golang.org/x/text |
v0.25.0 -> v0.27.0 |