7.8
CVSSv3

CVE-2021-41103

Published: 04/10/2021 Updated: 31/01/2024
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

containerd is an open source container runtime with an emphasis on simplicity, robustness and portability. A bug was found in containerd where container root directories and some plugins had insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as setuid), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files. This vulnerability has been fixed in containerd 1.4.11 and containerd 1.5.7. Users should update to these version when they are released and may restart containers or update directory permissions to mitigate the vulnerability. Users unable to update should limit access to the host to trusted users. Update directory permission on container bundles directories.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linuxfoundation containerd

fedoraproject fedora 34

fedoraproject fedora 35

debian debian linux 11.0

Vendor Advisories

Synopsis Important: Release of containers for OSP 162z director operator tech preview Type/Severity Security Advisory: Important Topic Red Hat OpenStack Platform 162 (Train) director operator containers, with several Important security fixes, are available for technology preview Description Release osp-director-operator imagesSecurity F ...
Synopsis Important: Release of containers for OSP 162z director operator tech preview Type/Severity Security Advisory: Important Topic Red Hat OpenStack Platform 162 (Train) director operator containers, with several Important security fixes, are available for technology preview Description Release osp-director-operator imagesSecurity F ...
A flaw was discovered in containerd, an open and reliable container runtime Insufficiently restricted permissions on container root and plugin directories could result in privilege escalation For the stable distribution (bullseye), this problem has been fixed in version 145~ds1-2+deb11u1 We recommend that you upgrade your containerd packages ...
A bug was found in containerd where container root directories and some plugins had insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs When containers included executable programs with extended permission bits (such as setuid), unprivileged Linux users could discov ...
containerd is an open source container runtime with an emphasis on simplicity, robustness and portability A bug was found in containerd where container root directories and some plugins had insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs When containers include ...
containerd is an open source container runtime with an emphasis on simplicity, robustness and portability A bug was found in containerd where container root directories and some plugins had insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs When containers include ...
containerd is an open source container runtime with an emphasis on simplicity, robustness and portability A bug was found in containerd where container root directories and some plugins had insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs When containers include ...
containerd is an open source container runtime with an emphasis on simplicity, robustness and portability A bug was found in containerd where container root directories and some plugins had insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs When containers include ...
A bug was found in containerd where container root directories and some plugins had insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs When containers included executable programs with extended permission bits (such as setuid), unprivileged Linux users could discov ...