CVE-2021-32760Resource Exposure in Containerd Containerd

Severity
6.3MEDIUMNVD
CNA5.0
EPSS
0.1%
top 78.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 19
Latest updateAug 21

Description

containerd is a container runtime. A bug was found in containerd versions prior to 1.4.8 and 1.5.4 where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host’s filesystem. Changes to file permissions can deny access to the expected owner of the file, widen access to others, or set extended bits like setuid, setgid, and sticky. This bug does not directly allow files to be read, modified, or executed without an additio

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:LExploitability: 2.8 | Impact: 3.4

Affected Packages4 packages

NVDlinuxfoundation/containerd1.5.01.5.4+1
Gogithub.com/containerd_containerd1.5.01.5.4+1
Debiancontainerd/containerd< 1.4.5~ds1-2+3
CVEListV5containerd/containerd1.4.7+1

Also affects: Fedora 34

🔴Vulnerability Details

6
OSV
Archive package allows chmod of file outside of unpack target directory in github.com/containerd/containerd2024-08-21
OSV
containerd vulnerabilities2022-07-15
GHSA
Archive package allows chmod of file outside of unpack target directory2021-07-26
OSV
Archive package allows chmod of file outside of unpack target directory2021-07-26
OSV
CVE-2021-32760: containerd is a container runtime2021-07-19

📋Vendor Advisories

5
Ubuntu
containerd vulnerabilities2022-07-15
Ubuntu
containerd vulnerabilities2021-07-20
Red Hat
containerd: pulling and extracting crafted container image may result in Unix file permission changes2021-07-19
Microsoft
Archive package allows chmod of file outside of unpack target directory2021-07-13
Debian
CVE-2021-32760: containerd - containerd is a container runtime. A bug was found in containerd versions prior ...2021
CVE-2021-32760 — Resource Exposure | cvebase