Lucene search

K
cvelistGitHub_MCVELIST:CVE-2021-32760
HistoryJul 19, 2021 - 12:00 a.m.

CVE-2021-32760 Archive package allows chmod of file outside of unpack target directory

2021-07-1900:00:00
CWE-668
GitHub_M
www.cve.org
1

5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L

6.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

50.8%

containerd is a container runtime. A bug was found in containerd versions prior to 1.4.8 and 1.5.4 where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host’s filesystem. Changes to file permissions can deny access to the expected owner of the file, widen access to others, or set extended bits like setuid, setgid, and sticky. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. This bug has been fixed in containerd 1.5.4 and 1.4.8. As a workaround, ensure that users only pull images from trusted sources. Linux security modules (LSMs) like SELinux and AppArmor can limit the files potentially affected by this bug through policies and profiles that prevent containerd from interacting with specific files.

CNA Affected

[
  {
    "vendor": "containerd",
    "product": "containerd",
    "versions": [
      {
        "version": "<= 1.4.7",
        "status": "affected"
      },
      {
        "version": ">= 1.5.0, <= 1.5.3",
        "status": "affected"
      }
    ]
  }
]

5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L

6.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

50.8%