6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
6.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
0.001 Low
EPSS
Percentile
51.0%
Issue Overview:
A bug was discovered in containerd where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the hostโs filesystem. Changes to file permissions can deny access to the expected owner of the file or widen access to others. (CVE-2021-32760)
A flaw was found in containerd CRI plugin. Containers launched through containerdโs CRI implementation that share the same image may receive incorrect environment variables, including values that are defined for other containers. The highest threat from this vulnerability is to data confidentiality. (CVE-2021-21334)
Affected Packages:
containerd
Issue Correction:
Run yum update containerd to update your system.
New Packages:
src:
ย ย ย containerd-1.4.6-2.7.amzn1.src
x86_64:
ย ย ย containerd-stress-1.4.6-2.7.amzn1.x86_64
ย ย ย containerd-debuginfo-1.4.6-2.7.amzn1.x86_64
ย ย ย containerd-1.4.6-2.7.amzn1.x86_64
Red Hat: CVE-2021-21334, CVE-2021-32760
Mitre: CVE-2021-21334, CVE-2021-32760
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | x86_64 | containerd-stress | <ย 1.4.6-2.7.amzn1 | containerd-stress-1.4.6-2.7.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | containerd-debuginfo | <ย 1.4.6-2.7.amzn1 | containerd-debuginfo-1.4.6-2.7.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | containerd | <ย 1.4.6-2.7.amzn1 | containerd-1.4.6-2.7.amzn1.x86_64.rpm |
6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
6.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
0.001 Low
EPSS
Percentile
51.0%