CVE-2021-43816 — Improper Preservation of Permissions in Containerd Containerd
Severity
9.1CRITICALNVD
CNA8.0
EPSS
0.1%
top 64.87%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 5
Latest updateAug 21
Description
containerd is an open source container runtime. On installations using SELinux, such as EL8 (CentOS, RHEL), Fedora, or SUSE MicroOS, with containerd since v1.5.0-beta.0 as the backing container runtime interface (CRI), an unprivileged pod scheduled to the node may bind mount, via hostPath volume, any privileged, regular file on disk for complete read/write access (sans delete). Such is achieved by placing the in-container location of the hostPath volume mount at either `/etc/hosts`, `/etc/hostna…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:HExploitability: 2.3 | Impact: 6.0
Affected Packages4 packages
Also affects: Fedora 34, 35
Patches
🔴Vulnerability Details
5OSV▶
Unprivileged pod using `hostPath` can side-step active LSM when it is SELinux in github.com/containerd/containerd↗2024-08-21