CVE-2021-32760

EUVD-2021-1457
containerd is a container runtime. A bug was found in containerd versions prior to 1.4.8 and 1.5.4 where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host’s filesystem. Changes to file permissions can deny access to the expected owner of the file, widen access to others, or set extended bits like setuid, setgid, and sticky. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. This bug has been fixed in containerd 1.5.4 and 1.4.8. As a workaround, ensure that users only pull images from trusted sources. Linux security modules (LSMs) like SELinux and AppArmor can limit the files potentially affected by this bug through policies and profiles that prevent containerd from interacting with specific files.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
GitHub_MCNA
5 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
Base Score
CVSS 3.x
EPSS Score
Percentile: 21%
Affected Products (NVD)
VendorProductVersion
linuxfoundationcontainerd
𝑥
< 1.4.8
linuxfoundationcontainerd
1.5.0 ≤
𝑥
< 1.5.4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
containerd
bookworm
1.6.20~ds1-1
fixed
bullseye
1.4.13~ds1-1~deb11u4
fixed
bullseye (security)
1.4.13~ds1-1~deb11u2
fixed
sid
1.7.23~ds2-1
fixed
trixie
1.7.22~ds1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
containerd
bionic
Fixed 1.5.2-0ubuntu1~18.04.2
released
focal
Fixed 1.5.2-0ubuntu1~20.04.2
released
groovy
Fixed 1.5.2-0ubuntu1~20.10.2
released
hirsute
Fixed 1.5.2-0ubuntu1~21.04.2
released
impish
Fixed 1.5.2-0ubuntu2
released
jammy
Fixed 1.5.2-0ubuntu2
released
trusty
dne
xenial
Fixed 1.2.6-0ubuntu1~16.04.6+esm2
released