Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2021-15790

Опубликовано: 23 июл. 2021
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2021-15790: containerd security update (IMPORTANT)

containerd [1.4.8-1]

  • Address CVE-2021-32760

docker-cli [19.03.11-13]

  • updated containerd minimum version to 1.4.8 to address CVE-2021-32760.

docker-engine [19.03.11-13]

  • updated containerd minimum version to 1.4.8 to address CVE-2021-32760.

Обновленные пакеты

Oracle Linux 7

Oracle Linux aarch64

containerd

1.4.8-1.el7

docker-cli

19.03.11.ol-13.el7

docker-engine

19.03.11.ol-13.el7

Oracle Linux x86_64

containerd

1.4.8-1.el7

docker-cli

19.03.11.ol-13.el7

docker-engine

19.03.11.ol-13.el7

Связанные CVE

Связанные уязвимости

CVSS3: 5
ubuntu
больше 4 лет назад

containerd is a container runtime. A bug was found in containerd versions prior to 1.4.8 and 1.5.4 where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host’s filesystem. Changes to file permissions can deny access to the expected owner of the file, widen access to others, or set extended bits like setuid, setgid, and sticky. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. This bug has been fixed in containerd 1.5.4 and 1.4.8. As a workaround, ensure that users only pull images from trusted sources. Linux security modules (LSMs) like SELinux and AppArmor can limit the files potentially affected by this bug through policies and profiles that prevent containerd from interacting with specific files.

CVSS3: 5.5
redhat
больше 4 лет назад

containerd is a container runtime. A bug was found in containerd versions prior to 1.4.8 and 1.5.4 where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host’s filesystem. Changes to file permissions can deny access to the expected owner of the file, widen access to others, or set extended bits like setuid, setgid, and sticky. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. This bug has been fixed in containerd 1.5.4 and 1.4.8. As a workaround, ensure that users only pull images from trusted sources. Linux security modules (LSMs) like SELinux and AppArmor can limit the files potentially affected by this bug through policies and profiles that prevent containerd from interacting with specific files.

CVSS3: 5
nvd
больше 4 лет назад

containerd is a container runtime. A bug was found in containerd versions prior to 1.4.8 and 1.5.4 where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host’s filesystem. Changes to file permissions can deny access to the expected owner of the file, widen access to others, or set extended bits like setuid, setgid, and sticky. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. This bug has been fixed in containerd 1.5.4 and 1.4.8. As a workaround, ensure that users only pull images from trusted sources. Linux security modules (LSMs) like SELinux and AppArmor can limit the files potentially affected by this bug through policies and profiles that prevent containerd from interacting with specific files.

CVSS3: 6.3
msrc
больше 4 лет назад

Archive package allows chmod of file outside of unpack target directory

CVSS3: 5
debian
больше 4 лет назад

containerd is a container runtime. A bug was found in containerd versi ...