CVE-2021-32760

containerd is a container runtime. A bug was found in containerd versions prior to 1.4.8 and 1.5.4 where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the hosts filesystem. Changes to file permissions can deny access to the expected owner of the file, widen access to others, or set extended bits like setuid, setgid, and sticky. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. This bug has been fixed in containerd 1.5.4 and 1.4.8. As a workaround, ensure that users only pull images from trusted sources. Linux security modules (LSMs) like SELinux and AppArmor can limit the files potentially affected by this bug through policies and profiles that prevent containerd from interacting with specific files.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
GitHub_MCNA
5 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 35%
VendorProductVersion
linuxfoundationcontainerd
𝑥
< 1.4.8
linuxfoundationcontainerd
1.5.0 ≤
𝑥
< 1.5.4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
containerd
bullseye
1.4.13~ds1-1~deb11u4
fixed
bullseye (security)
1.4.13~ds1-1~deb11u2
fixed
bookworm
1.6.20~ds1-1
fixed
trixie
1.7.22~ds1-1
fixed
sid
1.7.23~ds2-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
containerd
jammy
Fixed 1.5.2-0ubuntu2
released
impish
Fixed 1.5.2-0ubuntu2
released
hirsute
Fixed 1.5.2-0ubuntu1~21.04.2
released
groovy
Fixed 1.5.2-0ubuntu1~20.10.2
released
focal
Fixed 1.5.2-0ubuntu1~20.04.2
released
bionic
Fixed 1.5.2-0ubuntu1~18.04.2
released
xenial
Fixed 1.2.6-0ubuntu1~16.04.6+esm2
released
trusty
dne