6.8
CVSSv2

CVE-2021-32760

Published: 19/07/2021 Updated: 28/07/2021
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.3 | Impact Score: 3.4 | Exploitability Score: 2.8
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

containerd is a container runtime. A bug was found in containerd versions before 1.4.8 and 1.5.4 where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host’s filesystem. Changes to file permissions can deny access to the expected owner of the file, widen access to others, or set extended bits like setuid, setgid, and sticky. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. This bug has been fixed in containerd 1.5.4 and 1.4.8. As a workaround, ensure that users only pull images from trusted sources. Linux security modules (LSMs) like SELinux and AppArmor can limit the files potentially affected by this bug through policies and profiles that prevent containerd from interacting with specific files.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linuxfoundation containerd

Vendor Advisories

containerd is a container runtime A bug was found in containerd versions prior to 148 and 154 where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host’s filesystem Changes to file permissions can deny access to the expected owner of the file, widen acc ...
Arch Linux Security Advisory ASA-202107-70 ========================================== Severity: Medium Date : 2021-07-27 CVE-ID : CVE-2021-32760 Package : containerd Type : directory traversal Remote : No Link : securityarchlinuxorg/AVG-2174 Summary ======= The package containerd before version 154-1 is vulnerable to direc ...
A bug was found in containerd version prior to 154 where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host's filesystem Changes to file permissions can deny access to the expected owner of the file, widen access to others, or set extended bits like setuid, setgid, ...