Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-43816
HistoryJan 05, 2022 - 12:00 a.m.

CVE-2021-43816

2022-01-0500:00:00
ubuntu.com
ubuntu.com
12

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

6 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

0.005 Low

EPSS

Percentile

76.0%

containerd is an open source container runtime. On installations using
SELinux, such as EL8 (CentOS, RHEL), Fedora, or SUSE MicroOS, with
containerd since v1.5.0-beta.0 as the backing container runtime interface
(CRI), an unprivileged pod scheduled to the node may bind mount, via
hostPath volume, any privileged, regular file on disk for complete
read/write access (sans delete). Such is achieved by placing the
in-container location of the hostPath volume mount at either /etc/hosts,
/etc/hostname, or /etc/resolv.conf. These locations are being relabeled
indiscriminately to match the container process-label which effectively
elevates permissions for savvy containers that would not normally be able
to access privileged host files. This issue has been resolved in version
1.5.9. Users are advised to upgrade as soon as possible.

Bugs

Notes

Author Note
alexmurray This vulnerability is specific to when using containerd with SELinux, whilst SELinux is supported on Ubuntu it is not enabled by default. Hence setting the priority of this CVE to low.
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchcontainerd<ย 1.5.9-0ubuntu1~18.04.1UNKNOWN
ubuntu20.04noarchcontainerd<ย 1.5.9-0ubuntu1~20.04.4UNKNOWN
ubuntu21.10noarchcontainerd<ย 1.5.9-0ubuntu1~21.10.3UNKNOWN
ubuntu22.04noarchcontainerd<ย 1.5.9-0ubuntu1UNKNOWN
ubuntu22.10noarchcontainerd<ย 1.5.9-0ubuntu1UNKNOWN
ubuntu23.04noarchcontainerd<ย 1.5.9-0ubuntu1UNKNOWN
ubuntu23.10noarchcontainerd<ย 1.5.9-0ubuntu1UNKNOWN
ubuntu16.04noarchcontainerd<ย anyUNKNOWN

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

6 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

0.005 Low

EPSS

Percentile

76.0%