CVE-2021-32760 (Medium) detected in github.com/containerd/cri-v1.11.1-0.20200601160732-d7ce093d63d0, github.com/containerd/containerd-6312b52de5ad8fa5637e6d1a24954b68448303a9 #32
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
CVE-2021-32760 - Medium Severity Vulnerability
Vulnerable Libraries - github.com/containerd/cri-v1.11.1-0.20200601160732-d7ce093d63d0, github.com/containerd/containerd-6312b52de5ad8fa5637e6d1a24954b68448303a9
github.com/containerd/cri-v1.11.1-0.20200601160732-d7ce093d63d0
Moved to https://github.com/containerd/containerd/tree/master/pkg/cri . If you wish to submit issues/PRs, please submit to https://github.com/containerd/containerd
Library home page: https://proxy.golang.org/github.com/containerd/cri/@v/v1.11.1-0.20200601160732-d7ce093d63d0.zip
Dependency Hierarchy:
github.com/containerd/containerd-6312b52de5ad8fa5637e6d1a24954b68448303a9
An open and reliable container runtime
Library home page: https://proxy.golang.org/github.com/containerd/containerd/@v/v1.4.0-beta.0.0.20200515000003-6312b52de5ad.zip
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
containerd is a container runtime. A bug was found in containerd versions prior to 1.4.8 and 1.5.4 where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host’s filesystem. Changes to file permissions can deny access to the expected owner of the file, widen access to others, or set extended bits like setuid, setgid, and sticky. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. This bug has been fixed in containerd 1.5.4 and 1.4.8. As a workaround, ensure that users only pull images from trusted sources. Linux security modules (LSMs) like SELinux and AppArmor can limit the files potentially affected by this bug through policies and profiles that prevent containerd from interacting with specific files.
Publish Date: 2021-07-19
URL: CVE-2021-32760
CVSS 3 Score Details (6.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-c72p-9xmj-rx3w
Release Date: 2021-07-19
Fix Resolution: v1.4.8 ,v1.5.4
The text was updated successfully, but these errors were encountered: