logo
DATABASE RESOURCES PRICING ABOUT US

Medium: containerd

Description

**Issue Overview:** A bug was discovered in containerd where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host's filesystem. Changes to file permissions can deny access to the expected owner of the file or widen access to others. (CVE-2021-32760) A flaw was found in containerd CRI plugin. Containers launched through containerd's CRI implementation that share the same image may receive incorrect environment variables, including values that are defined for other containers. The highest threat from this vulnerability is to data confidentiality. (CVE-2021-21334) **Affected Packages:** containerd **Issue Correction:** Run _yum update containerd_ to update your system. **New Packages:** src:     containerd-1.4.6-2.7.amzn1.src x86_64:     containerd-stress-1.4.6-2.7.amzn1.x86_64     containerd-debuginfo-1.4.6-2.7.amzn1.x86_64     containerd-1.4.6-2.7.amzn1.x86_64 ### Additional References Red Hat: [CVE-2021-21334](<https://access.redhat.com/security/cve/CVE-2021-21334>), [CVE-2021-32760](<https://access.redhat.com/security/cve/CVE-2021-32760>) Mitre: [CVE-2021-21334](<https://vulners.com/cve/CVE-2021-21334>), [CVE-2021-32760](<https://vulners.com/cve/CVE-2021-32760>)


Affected Package


OS OS Version Package Name Package Version
Amazon Linux 1 containerd 1.4.6-2.7.amzn1
Amazon Linux 1 containerd-stress 1.4.6-2.7.amzn1
Amazon Linux 1 containerd-debuginfo 1.4.6-2.7.amzn1
Amazon Linux 1 containerd 1.4.6-2.7.amzn1

Related