Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-43816

Опубликовано: 05 янв. 2022
Источник: redhat
CVSS3: 8
EPSS Низкий

Описание

containerd is an open source container runtime. On installations using SELinux, such as EL8 (CentOS, RHEL), Fedora, or SUSE MicroOS, with containerd since v1.5.0-beta.0 as the backing container runtime interface (CRI), an unprivileged pod scheduled to the node may bind mount, via hostPath volume, any privileged, regular file on disk for complete read/write access (sans delete). Such is achieved by placing the in-container location of the hostPath volume mount at either /etc/hosts, /etc/hostname, or /etc/resolv.conf. These locations are being relabeled indiscriminately to match the container process-label which effectively elevates permissions for savvy containers that would not normally be able to access privileged host files. This issue has been resolved in version 1.5.9. Users are advised to upgrade as soon as possible.

An incorrect permission assignment flaw was found in containerd. This flaw allows a local attacker to use a specially designed text file to read and write files outside of the container's scope.

Отчет

Because Red Hat OpenStack Platform's director-operator does not use hostPath volumes, the RHOSP Impact has been rated Low impact and no updates will be provided at this time for its containers. In Red Hat OpenShift Container Platform (OCP) the containerd package is not actually used, but because the containerd API is supported the core OCP components are listed as affected by this CVE and the impact is reduced to Low.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Developer Tools and Servicesocp-tools-4/jenkins-rhel8Not affected
Red Hat Advanced Cluster Management for Kubernetes 2containerdNot affected
Red Hat Advanced Cluster Management for Kubernetes 2multicloud-operators-channel-containerAffected
Red Hat Advanced Cluster Management for Kubernetes 2multicloud-operators-subscription-containerAffected
Red Hat Advanced Cluster Management for Kubernetes 2multicloud-operators-subscription-release-containerAffected
Red Hat Advanced Cluster Management for Kubernetes 2multicluster-hub-repo-containerAffected
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/prometheus-rhel8Affected
Red Hat OpenShift Container Platform 4cri-oNot affected
Red Hat OpenShift Container Platform 4openshiftAffected
Red Hat OpenShift Container Platform 4openshift-clientsWill not fix

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-281
https://bugzilla.redhat.com/show_bug.cgi?id=2044434containerd: Unprivileged pod may bind mount any privileged regular file on disk

EPSS

Процентиль: 35%
0.00147
Низкий

8 High

CVSS3

Связанные уязвимости

CVSS3: 8
ubuntu
около 4 лет назад

containerd is an open source container runtime. On installations using SELinux, such as EL8 (CentOS, RHEL), Fedora, or SUSE MicroOS, with containerd since v1.5.0-beta.0 as the backing container runtime interface (CRI), an unprivileged pod scheduled to the node may bind mount, via hostPath volume, any privileged, regular file on disk for complete read/write access (sans delete). Such is achieved by placing the in-container location of the hostPath volume mount at either `/etc/hosts`, `/etc/hostname`, or `/etc/resolv.conf`. These locations are being relabeled indiscriminately to match the container process-label which effectively elevates permissions for savvy containers that would not normally be able to access privileged host files. This issue has been resolved in version 1.5.9. Users are advised to upgrade as soon as possible.

CVSS3: 8
nvd
около 4 лет назад

containerd is an open source container runtime. On installations using SELinux, such as EL8 (CentOS, RHEL), Fedora, or SUSE MicroOS, with containerd since v1.5.0-beta.0 as the backing container runtime interface (CRI), an unprivileged pod scheduled to the node may bind mount, via hostPath volume, any privileged, regular file on disk for complete read/write access (sans delete). Such is achieved by placing the in-container location of the hostPath volume mount at either `/etc/hosts`, `/etc/hostname`, or `/etc/resolv.conf`. These locations are being relabeled indiscriminately to match the container process-label which effectively elevates permissions for savvy containers that would not normally be able to access privileged host files. This issue has been resolved in version 1.5.9. Users are advised to upgrade as soon as possible.

CVSS3: 8
debian
около 4 лет назад

containerd is an open source container runtime. On installations using ...

CVSS3: 8
github
около 4 лет назад

Unprivileged pod using `hostPath` can side-step active LSM when it is SELinux

EPSS

Процентиль: 35%
0.00147
Низкий

8 High

CVSS3