Lucene search

K
archlinuxArchLinuxASA-202107-70
HistoryJul 27, 2021 - 12:00 a.m.

[ASA-202107-70] containerd: directory traversal

2021-07-2700:00:00
security.archlinux.org
251

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

50.4%

Arch Linux Security Advisory ASA-202107-70

Severity: Medium
Date : 2021-07-27
CVE-ID : CVE-2021-32760
Package : containerd
Type : directory traversal
Remote : No
Link : https://security.archlinux.org/AVG-2174

Summary

The package containerd before version 1.5.4-1 is vulnerable to
directory traversal.

Resolution

Upgrade to 1.5.4-1.

pacman -Syu โ€œcontainerd>=1.5.4-1โ€

The problem has been fixed upstream in version 1.5.4.

Workaround

As a workaround, ensure that users only pull images from trusted
sources. Linux security modules (LSMs) like AppArmor can limit the
files potentially affected by this bug through policies and profiles
that prevent containerd from interacting with specific files.

Description

A bug was found in containerd version prior to 1.5.4 where pulling and
extracting a specially-crafted container image can result in Unix file
permission changes for existing files in the hostโ€™s filesystem. Changes
to file permissions can deny access to the expected owner of the file,
widen access to others, or set extended bits like setuid, setgid, and
sticky. This bug does not directly allow files to be read, modified, or
executed without an additional cooperating process.

Impact

A crafted container image could change file permissions on the host
system, leading to potential denial of service or information
disclosure.

References

https://github.com/containerd/containerd/security/advisories/GHSA-c72p-9xmj-rx3w
https://github.com/containerd/containerd/commit/37a44de17d5d09e258e3c8c29d32ae99797e7c11
https://security.archlinux.org/CVE-2021-32760

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanycontainerd<ย 1.5.4-1UNKNOWN

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

50.4%