Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-32760
HistoryJul 19, 2021 - 12:00 a.m.

CVE-2021-32760

2021-07-1900:00:00
ubuntu.com
ubuntu.com
16

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

50.2%

containerd is a container runtime. A bug was found in containerd versions
prior to 1.4.8 and 1.5.4 where pulling and extracting a specially-crafted
container image can result in Unix file permission changes for existing
files in the host’s filesystem. Changes to file permissions can deny access
to the expected owner of the file, widen access to others, or set extended
bits like setuid, setgid, and sticky. This bug does not directly allow
files to be read, modified, or executed without an additional cooperating
process. This bug has been fixed in containerd 1.5.4 and 1.4.8. As a
workaround, ensure that users only pull images from trusted sources. Linux
security modules (LSMs) like SELinux and AppArmor can limit the files
potentially affected by this bug through policies and profiles that prevent
containerd from interacting with specific files.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchcontainerd< 1.5.2-0ubuntu1~18.04.2UNKNOWN
ubuntu20.04noarchcontainerd< 1.5.2-0ubuntu1~20.04.2UNKNOWN
ubuntu20.10noarchcontainerd< 1.5.2-0ubuntu1~20.10.2UNKNOWN
ubuntu21.04noarchcontainerd< 1.5.2-0ubuntu1~21.04.2UNKNOWN
ubuntu21.10noarchcontainerd< 1.5.2-0ubuntu2UNKNOWN
ubuntu22.04noarchcontainerd< 1.5.2-0ubuntu2UNKNOWN
ubuntu16.04noarchcontainerd< 1.2.6-0ubuntu1~16.04.6+esm2UNKNOWN

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

50.2%