Lucene search

K
ubuntuUbuntuUSN-5100-1
HistoryOct 04, 2021 - 12:00 a.m.

containerd vulnerability

2021-10-0400:00:00
ubuntu.com
139
containerd
ubuntu
vulnerability
permissions
directory traversal
privilege escalation
security

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.1

Confidence

High

EPSS

0

Percentile

14.2%

Releases

  • Ubuntu 21.04
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 ESM

Packages

  • containerd - daemon to control runC

Details

It was discovered that containerd insufficiently restricted permissions on
container root and plugin directories. If a user or automated system were
tricked into launching a specially crafted container image, a remote
attacker could traverse directory contents and modify files and execute
programs on the host filesystem, possibly leading to privilege escalation.

OSVersionArchitecturePackageVersionFilename
Ubuntu21.04noarchcontainerd<ย 1.5.2-0ubuntu1~21.04.3UNKNOWN
Ubuntu21.04noarchcontainerd-dbgsym<ย 1.5.2-0ubuntu1~21.04.3UNKNOWN
Ubuntu21.04noarchgolang-github-containerd-containerd-dev<ย 1.5.2-0ubuntu1~21.04.3UNKNOWN
Ubuntu20.04noarchcontainerd<ย 1.5.2-0ubuntu1~20.04.3UNKNOWN
Ubuntu20.04noarchcontainerd-dbgsym<ย 1.5.2-0ubuntu1~20.04.3UNKNOWN
Ubuntu20.04noarchgolang-github-containerd-containerd-dev<ย 1.5.2-0ubuntu1~20.04.3UNKNOWN
Ubuntu20.04noarchgolang-github-docker-containerd-dev<ย 1.5.2-0ubuntu1~20.04.3UNKNOWN
Ubuntu18.04noarchcontainerd<ย 1.5.2-0ubuntu1~18.04.3UNKNOWN
Ubuntu18.04noarchcontainerd-dbgsym<ย 1.5.2-0ubuntu1~18.04.3UNKNOWN
Ubuntu18.04noarchgolang-github-containerd-containerd-dev<ย 1.5.2-0ubuntu1~18.04.3UNKNOWN
Rows per page:
1-10 of 111

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.1

Confidence

High

EPSS

0

Percentile

14.2%