c11umw
(C11umw)
November 8, 2025, 9:57pm
1
Fatal Docker Error after running an apt-get update.
No containers were [re]started and they returned the following error when trying to start manually:
docker: Error response from daemon: failed to create task for container: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: open sysctl net.ipv4.ip_unprivileged_port_start file: reopen fd 8: permission denied: unknown
Tested with docker run hello world and it showed the same error.
Environment:
Proxmox 8.4.14
LXC running Debian GNU/Linux 11 (bullseye) x86_64
Kernel: 6.8.12-11-pve
After checked against an alternate LXC with working docker (pre-update).
apt-cache policy docker-ce docker-ce-cli containerd.io docker-buildx-plugin docker-compose-plugin | grep -i installed
Updated LXC:
docker-ce Installed: 5:28.5.2-1~debian.11~bullseye
docker-ce-cli Installed: 5:28.5.2-1~debian.11~bullseye
containerd.io Installed: 1.7.29-1~debian.11~bullseye
docker-buildx-plugin Installed: 0.29.1-1~debian.11~bullseye
docker-compose-plugin Installed: 2.40.3-1~debian.11~bullseye
The working LXC:
docker-ce Installed: 5:28.0.0-1~debian.11~bullseye
docker-ce-cli Installed: 5:28.0.0-1~debian.11~bullseye
containerd.io Installed: 1.7.25-1
docker-buildx-plugin Installed: 0.21.0-1~debian.11~bullseye
docker-compose-plugin Installed: 2.33.0-1~debian.11~bullseye
Rolled back each in turn followed by a systemctl restart docker ; docker run hello world until it ran without error..
It wasn’t until I rolled back docker-ce and containerd.io that the hello world test was successful.
docker-ce on it’s own didn’t fix it and containerd.io on it’s own didn’t fix it. It needed to be both
So, I went through the apt-cache for all the versions and this is the newest combination that works.
docker-ce=5:28.3.3-1~debian.11~bullseye
containerd.io=1.7.28-1~debian.11~bullseye
This and future caused docker containers to fail.
docker-ce=5:28.4.0-1~debian.11~bullseye
containerd.io=1.7.28-2~debian.11~bullseye
C
1 Like
c11umw
(C11umw)
November 8, 2025, 10:06pm
2
As of this moment this is what I have to keep it running and prevent it from updating
sudo apt-get install docker-ce=5:28.3.3-1~debian.11~bullseye containerd.io=1.7.28-1~debian.11~bullseye
sudo apt-mark hold docker-ce=5:28.3.3-1~debian.11~bullseye containerd.io=1.7.28-1~debian.11~bullseye
1 Like
meyay
(Metin Y.)
November 9, 2025, 10:26am
3
Thank you for sharing it with the community.
Though, please do mention that you are using Proxmox 8, as we lately had topics about Proxmox 9 where people tried to run docker-ce on the hypervisor itself. It was (is still?) not working due to differences between vanilla Debian 13 and Proxmox 9.
If you want to raise an issue, so the developers can see it, you might want to post it where devs can notice it: in docker’s upstream project Moby:
godmankey
(Godmankey)
November 9, 2025, 10:00pm
4
I had the same issue with an LXC Debian 12 container on Proxmox 9. The fix worked, just had to change it for Debain 12. Thanks for figuring this out!!!
1 Like
jph290
(Jason Helmus)
November 11, 2025, 4:18am
5
Same issue here with Debian Bookworm running in an unprivileged LXC on Proxmox 8.4.14.
Ran apt-get and apt-mark commands and now works.
benlenau
(Ben)
November 12, 2025, 9:11am
6
Debian 13 and LXC. Yeah this is really annoying, hope there’s a permanent fix that isn’t holding back packages and not being able to upgrade containerd. io. The follwing is enough.
apt-hold containerd.io
apt install containerd.io=1.7.28-1~debian.13~trixie
ps. this is still a problem with the newest version (from 12th of november 2025)
docker-ce-cli amd64 5:29.0.0-1~debian.13~trixie
containerd. io amd64 2.1.5-1~debian.13~trixie
docker-ce amd64 5:29.0.0-1~debian.13~trixie
docker-ce-rootless-extras amd64 5:29.0.0-1~debian.13~trixie
pps. it is also possible to solve this by running apt-mark hold runc, but isn’t recommended (due to it being further in the execution stack - as I understand it.)
ppps. it is also possible to run lxc-container config with lxc.apparmor.profile: unconfined but isn’t recommended since this lowers security. Can be done if services only available on LAN (read: not Internet facing).
c11umw
(C11umw)
November 12, 2025, 5:15pm
7
Hi meyay
It’s Proxmox 8 (.4.14) as per my initial post
I wouldn’t dare put docker on the node. I save all that for LXC and VMs
I’ll follow you advice and raise it as an issue if someone hasn’t already beaten me to it.
1 Like
c11umw
(C11umw)
November 12, 2025, 5:20pm
8
Thanks for checking the latest.
I agree the apt-mark hold isn’t ideal, but I did it purely to allow other packages to update without breaking docker.
c11umw
(C11umw)
November 12, 2025, 5:47pm
9
Raised in Github as requested/suggested
opened 05:46PM - 12 Nov 25 UTC
status/0-triage
kind/bug
### Description
Posted initially on [Docker Forum](https://forums.docker.com/t/… docker-fails-to-run-on-debian-bullseye-after-update-unable-to-start-container-process-error-during-container-init-open-sysctl-net-ipv4-ip-unprivileged-port-start-file-reopen-fd-8-permission-denied-unknown/150363), but I was asked to post here so it can be tracked and resolved.
Fatal Docker Error after running an apt-get update.
None of the previously running containers were started and when I tried to start manually they returned the following error:
>docker: Error response from daemon: failed to create task for container: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: open sysctl net.ipv4.ip_unprivileged_port_start file: reopen fd 8: permission denied: unknown
Environment:
>Proxmox 8.4.14
Docker in an LXC with Debian GNU/Linux 11 (bullseye) x86_64
Kernel: 6.8.12-11-pve
The apt update pulled these versions:
```sh
apt-cache policy docker-ce docker-ce-cli containerd.io docker-buildx-plugin docker-compose-plugin | grep -i installed
docker-ce Installed: 5:28.5.2-1~debian.11~bullseye
docker-ce-cli Installed: 5:28.5.2-1~debian.11~bullseye
containerd.io Installed: 1.7.29-1~debian.11~bullseye
docker-buildx-plugin Installed: 0.29.1-1~debian.11~bullseye
docker-compose-plugin Installed: 2.40.3-1~debian.11~bullseye
```
Cross referenced a working LXC (not yet updated) and compared the packages installed.
After rolling back each in turn I found that both these 2 had to be these specific versions or older for docker to start containers again:
```
docker-ce 5:28.3.3-1~debian.11~bullseye
containerd.io 1.7.28-1~debian.11~bullseye
```
### Reproduce
Install these versions or newer and it errors when trying to start containers.
```
docker-ce 5:28.4.0-1~debian.11~bullseye
containerd.io 1.7.28-2~debian.11~bullseye
```
### Expected behavior
`docker run hello-world`
Should pull the image, run and show the hello-world text.
Instead it pulls the image then errors
### docker version
```bash
Client: Docker Engine - Community
Version: 29.0.0
API version: 1.52
Go version: go1.25.4
Git commit: 3d4129b
Built: Mon Nov 10 21:47:13 2025
OS/Arch: linux/amd64
Context: default
Server: Docker Engine - Community
Engine:
Version: 29.0.0
API version: 1.52 (minimum version 1.44)
Go version: go1.25.4
Git commit: d105562
Built: Mon Nov 10 21:47:13 2025
OS/Arch: linux/amd64
Experimental: false
containerd:
Version: v2.1.5
GitCommit: fcd43222d6b07379a4be9786bda52438f0dd16a1
runc:
Version: 1.3.3
GitCommit: v1.3.3-0-gd842d771
docker-init:
Version: 0.19.0
GitCommit: de40ad0
```
### docker info
```bash
Client: Docker Engine - Community
Version: 29.0.0
Context: default
Debug Mode: false
Plugins:
buildx: Docker Buildx (Docker Inc.)
Version: v0.29.1
Path: /usr/libexec/docker/cli-plugins/docker-buildx
compose: Docker Compose (Docker Inc.)
Version: v2.40.3
Path: /usr/libexec/docker/cli-plugins/docker-compose
Server:
Containers: 3
Running: 0
Paused: 0
Stopped: 3
Images: 1
Server Version: 29.0.0
Storage Driver: overlay2
Backing Filesystem: extfs
Supports d_type: true
Using metacopy: false
Native Overlay Diff: true
userxattr: true
Logging Driver: json-file
Cgroup Driver: systemd
Cgroup Version: 2
Plugins:
Volume: local
Network: bridge host ipvlan macvlan null overlay
Log: awslogs fluentd gcplogs gelf journald json-file local splunk syslog
CDI spec directories:
/etc/cdi
/var/run/cdi
Swarm: inactive
Runtimes: io.containerd.runc.v2 runc
Default Runtime: runc
Init Binary: docker-init
containerd version: fcd43222d6b07379a4be9786bda52438f0dd16a1
runc version: v1.3.3-0-gd842d771
init version: de40ad0
Security Options:
seccomp
Profile: builtin
cgroupns
Kernel Version: 6.8.12-11-pve
Operating System: Debian GNU/Linux 11 (bullseye)
OSType: linux
Architecture: x86_64
CPUs: 2
Total Memory: 1GiB
Name: TemplateDebian
ID: 69fd19a9-4ebd-48ee-a6d0-b201946b8de7
Docker Root Dir: /var/lib/docker
Debug Mode: false
Experimental: false
Insecure Registries:
::1/128
127.0.0.0/8
Live Restore Enabled: false
Firewall Backend: iptables
```
### Additional Info
For now I've rolled back to the working versions and have them held so other updates can still be applied.
```sh
sudo apt-get install docker-ce=5:28.3.3-1~debian.11~bullseye containerd.io=1.7.28-1~debian.11~bullseye
sudo apt-mark hold docker-ce=5:28.3.3-1~debian.11~bullseye containerd.io=1.7.28-1~debian.11~bullseye
```
1 Like
c11umw
(C11umw)
November 13, 2025, 3:59pm
10
Last update from me (probably)
The issue was closed in Github as a duplicate, but I followed the trail and it seems to be caused by a [mis]configuration error in AppArmour.
The Hotfix to resolve it is to switch off AppArmour
This should be safe to do as long as you don’t install 3rd party containers.
If you run third-party images or allow untrusted users access to spawn containers, DO NOT downgrade . This [AppArmour] update was a security update which fixed THREE container escape vulnerabilities that can be triggered by untrusted images or docker build .
The Hotfix:
Log into the LXC and run:
sudo mount --bind /dev/null /sys/module/apparmor/parameters/enabled
sudo systemctl restart docker
Then add adding the below setting in the host/node: /etc/pve/lxc/[LXC].conf
lxc.apparmor.profile=unconfined
Restart the LXC, unhold the 2 docker components, app update and docker still works
Github investigation for reference
opened 05:31PM - 05 Nov 25 UTC
closed 01:48PM - 06 Nov 25 UTC
kind/external
kind/duplicate
kind/external/docker-packaging
### Description
Hi,
**Given the bug, I'm not sure if it is the right place to … report it. Don't hesitate to redirect me to the right person.**
When using `containerd.io=1.7.28-2~debian.13~trixie` in a lxc (host is a proxmox server), running containers raise the following error:
```
$ docker run hello-world
docker: Error response from daemon: failed to create task for container: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: open sysctl net.ipv4.ip_unprivileged_port_start file: reopen fd 8: permission denied: unknown
```
When rolling back to `containerd.io=1.7.28-1~debian.13~trixie` it works fine (at least for hello-world).
What makes me think it is unrelated to the actual containerd.io binary is that both apt package give `containerd.io v1.7.28 b98a3aace656320842a23f4a392a33f46af97866` as their version (using `containerd --version`).
### Steps to reproduce the issue
1. in a lxc (unprivileged, nesting=1), on an up-to-date debian 13 (12 seems to have the same issue) with the normal docker installation (from docs.docker.com)
2. run `docker run hello-world`
### Describe the results you received and expected
The container does not start when using `1.7.28-2~debian.13~trixie` but it does with `1.7.28-1~debian.13~trixie`. The error is the following.
```
docker: Error response from daemon: failed to create task for container: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: open sysctl net.ipv4.ip_unprivileged_port_start file: reopen fd 8: permission denied: unknown
```
### What version of containerd are you using?
containerd containerd.io v1.7.28 b98a3aace656320842a23f4a392a33f46af97866
### Any other relevant information
The final test I did before posting this:
```
root@test:~# apt update
[...]
All packages are up to date.
root@test:~# apt list --installed | grep containerd
containerd.io/trixie,now 1.7.28-2~debian.13~trixie amd64 [installed]
root@test:~# containerd --version
containerd containerd.io v1.7.28 b98a3aace656320842a23f4a392a33f46af97866
root@test:~# docker run hello-world
docker: Error response from daemon: failed to create task for container: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: open sysctl net.ipv4.ip_unprivileged_port_start file: reopen fd 8: permission denied: unknown
Run 'docker run --help' for more information
root@test:~# apt install -y containerd.io=1.7.28-1~debian.13~trixie
[...]
root@test:~# apt list --installed | grep containerd
containerd.io/trixie,now 1.7.28-1~debian.13~trixie amd64 [installed,upgradable to: 1.7.28-2~debian.13~trixie]
root@test:~# containerd --version
containerd containerd.io v1.7.28 b98a3aace656320842a23f4a392a33f46af97866
docker run hello-world
Hello from Docker!
[...]
```
Let me know if it would be interesting to check on a bare bone machine.
### Show configuration if it is related to CRI plugin.
_No response_
system
(system)
Closed
December 13, 2025, 3:59pm
11
This topic was automatically closed 30 days after the last reply. New replies are no longer allowed.