Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2022-00757

Опубликовано: 04 окт. 2021
Источник: fstec
CVSS3: 5.9
CVSS2: 4.6
EPSS Низкий

Описание

Уязвимость среды выполнения контейнеров Containerd связана с недостатками разграничения доступа к корневым каталогам и плагинам. Эксплуатация уязвимости может позволить нарушителю получить доступ на чтение и изменение файлов

Вендор

Fedora Project
Сообщество свободного программного обеспечения
ООО «Ред Софт»
ООО «РусБИТех-Астра»
Dell Inc.
Cloud Native Computing Foundation
АО «ИВК»

Наименование ПО

Fedora
Debian GNU/Linux
РЕД ОС
Astra Linux Special Edition
Dell EMC VxRail
Containerd
Альт 8 СП

Версия ПО

34 (Fedora)
11 (Debian GNU/Linux)
35 (Fedora)
7.3 (РЕД ОС)
1.7 (Astra Linux Special Edition)
от 7.0.0 до 7.0.320 (Dell EMC VxRail)
до 1.4.11 (Containerd)
от 1.5.0 до 1.5.7 (Containerd)
- (Альт 8 СП)
4.7 (Astra Linux Special Edition)

Тип ПО

Операционная система
ПО виртуализации/ПО виртуального программно-аппаратного средства
Прикладное ПО информационных систем

Операционные системы и аппаратные платформы

Fedora Project Fedora 34
Сообщество свободного программного обеспечения Debian GNU/Linux 11
Fedora Project Fedora 35
ООО «Ред Софт» РЕД ОС 7.3
ООО «РусБИТех-Астра» Astra Linux Special Edition 1.7
ООО «РусБИТех-Астра» Astra Linux Special Edition 4.7

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 4,6)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 5,9)

Возможные меры по устранению уязвимости

Использование рекомендаций:
Для Containerd:
https://github.com/containerd/containerd/commit/5b46e404f6b9f661a205e28d59c982d3634148f8
https://github.com/containerd/containerd/security/advisories/GHSA-c2h3-6mxw-7mvq
http://github.com/containerd/containerd/releases/tag/v1.5.7
http://github.com/containerd/containerd/releases/tag/v1.4.11
Для Ред ОС:
https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ispolnyaemoy-sredy-dlya-zapuska-konteynerov-containerd-cve-2021-41103/
Для продуктов Dell:
https://www.dell.com/support/kbdoc/ru-ru/000195888/dsa-2022-022-dell-dell-emc-vxrail-security-update-for-multiple-third-party-component-vulnerabilities
Для Debian:
https://www.debian.org/security/2021/dsa-5002
Для Fedora:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Q6G6I4W5COQE25QMC7FJY3I3PAYFBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNFADTCHHYWVM6W4NJ6CB4FNFM2VMBIB/
Для ОС Альт 8 СП:
Обновление программного обеспечения до актуальной версии
Для ОС Astra Linux Special Edition 1.7:
использование рекомендаций производителя: https://wiki.astralinux.ru/astra-linux-se17-bulletin-2022-1221SE17MD
Для ОС Astra Linux Special Edition 4.7 для архитектуры ARM:
использование рекомендаций производителя: https://wiki.astralinux.ru/astra-linux-se47-bulletin-2023-0131SE47MD

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 26%
0.00085
Низкий

5.9 Medium

CVSS3

4.6 Medium

CVSS2

Связанные уязвимости

redos
больше 3 лет назад

Уязвимость исполняемой среды для запуска контейнеров containerd

CVSS3: 7.8
ubuntu
больше 3 лет назад

containerd is an open source container runtime with an emphasis on simplicity, robustness and portability. A bug was found in containerd where container root directories and some plugins had insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as setuid), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files. This vulnerability has been fixed in containerd 1.4.11 and containerd 1.5.7. Users should update to these version when they are released and may restart containers or update directory permissions to mitigate the vulnerability. Users unable to update should limit access to the host to trusted users. Update dir...

CVSS3: 5.9
redhat
больше 3 лет назад

containerd is an open source container runtime with an emphasis on simplicity, robustness and portability. A bug was found in containerd where container root directories and some plugins had insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as setuid), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files. This vulnerability has been fixed in containerd 1.4.11 and containerd 1.5.7. Users should update to these version when they are released and may restart containers or update directory permissions to mitigate the vulnerability. Users unable to update should limit access to the host to trusted users. Update dir...

CVSS3: 7.8
nvd
больше 3 лет назад

containerd is an open source container runtime with an emphasis on simplicity, robustness and portability. A bug was found in containerd where container root directories and some plugins had insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as setuid), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files. This vulnerability has been fixed in containerd 1.4.11 and containerd 1.5.7. Users should update to these version when they are released and may restart containers or update directory permissions to mitigate the vulnerability. Users unable to update should limit access to the host to trusted users. Update direct

CVSS3: 7.8
msrc
больше 3 лет назад

Описание отсутствует

EPSS

Процентиль: 26%
0.00085
Низкий

5.9 Medium

CVSS3

4.6 Medium

CVSS2