6.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
50.2%
Issue Overview:
A bug was discovered in containerd where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the hostโs filesystem. Changes to file permissions can deny access to the expected owner of the file or widen access to others. (CVE-2021-32760)
A flaw was found in containerd CRI plugin. Containers launched through containerdโs CRI implementation that share the same image may receive incorrect environment variables, including values that are defined for other containers. The highest threat from this vulnerability is to data confidentiality. (CVE-2021-21334)
Affected Packages:
containerd
Issue Correction:
Run yum update containerd to update your system.
New Packages:
src:
ย ย ย containerd-1.4.6-2.7.amzn1.src
x86_64:
ย ย ย containerd-stress-1.4.6-2.7.amzn1.x86_64
ย ย ย containerd-debuginfo-1.4.6-2.7.amzn1.x86_64
ย ย ย containerd-1.4.6-2.7.amzn1.x86_64
Red Hat: CVE-2021-21334, CVE-2021-32760
Mitre: CVE-2021-21334, CVE-2021-32760
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | x86_64 | containerd-stress | <ย 1.4.6-2.7.amzn1 | containerd-stress-1.4.6-2.7.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | containerd-debuginfo | <ย 1.4.6-2.7.amzn1 | containerd-debuginfo-1.4.6-2.7.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | containerd | <ย 1.4.6-2.7.amzn1 | containerd-1.4.6-2.7.amzn1.x86_64.rpm |
6.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
50.2%