Логотип exploitDog
bind:CVE-2021-32760
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-32760

Количество 17

Количество 17

ubuntu логотип

CVE-2021-32760

больше 4 лет назад

containerd is a container runtime. A bug was found in containerd versions prior to 1.4.8 and 1.5.4 where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host’s filesystem. Changes to file permissions can deny access to the expected owner of the file, widen access to others, or set extended bits like setuid, setgid, and sticky. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. This bug has been fixed in containerd 1.5.4 and 1.4.8. As a workaround, ensure that users only pull images from trusted sources. Linux security modules (LSMs) like SELinux and AppArmor can limit the files potentially affected by this bug through policies and profiles that prevent containerd from interacting with specific files.

CVSS3: 5
EPSS: Низкий
redhat логотип

CVE-2021-32760

больше 4 лет назад

containerd is a container runtime. A bug was found in containerd versions prior to 1.4.8 and 1.5.4 where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host’s filesystem. Changes to file permissions can deny access to the expected owner of the file, widen access to others, or set extended bits like setuid, setgid, and sticky. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. This bug has been fixed in containerd 1.5.4 and 1.4.8. As a workaround, ensure that users only pull images from trusted sources. Linux security modules (LSMs) like SELinux and AppArmor can limit the files potentially affected by this bug through policies and profiles that prevent containerd from interacting with specific files.

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2021-32760

больше 4 лет назад

containerd is a container runtime. A bug was found in containerd versions prior to 1.4.8 and 1.5.4 where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host’s filesystem. Changes to file permissions can deny access to the expected owner of the file, widen access to others, or set extended bits like setuid, setgid, and sticky. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. This bug has been fixed in containerd 1.5.4 and 1.4.8. As a workaround, ensure that users only pull images from trusted sources. Linux security modules (LSMs) like SELinux and AppArmor can limit the files potentially affected by this bug through policies and profiles that prevent containerd from interacting with specific files.

CVSS3: 5
EPSS: Низкий
msrc логотип

CVE-2021-32760

больше 4 лет назад

Archive package allows chmod of file outside of unpack target directory

CVSS3: 6.3
EPSS: Низкий
debian логотип

CVE-2021-32760

больше 4 лет назад

containerd is a container runtime. A bug was found in containerd versi ...

CVSS3: 5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:2412-1

больше 4 лет назад

Security update for containerd

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:1081-1

больше 4 лет назад

Security update for containerd

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2413-1

больше 4 лет назад

Security update for containerd

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2412-1

больше 4 лет назад

Security update for containerd

EPSS: Низкий
github логотип

GHSA-c72p-9xmj-rx3w

больше 4 лет назад

Archive package allows chmod of file outside of unpack target directory

CVSS3: 5
EPSS: Низкий
oracle-oval логотип

ELSA-2021-9373

больше 4 лет назад

ELSA-2021-9373: containerd security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-15790

больше 4 лет назад

ELSA-2021-15790: containerd security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2021-04214

больше 4 лет назад

Уязвимость реализации команды chmod среды выполнения контейнеров Containerd, позволяющая нарушителю повысить свои привилегии

CVSS3: 5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:3506-1

больше 4 лет назад

Security update for containerd, docker, runc

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:1404-1

больше 4 лет назад

Security update for containerd, docker, runc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:3506-1

больше 4 лет назад

Security update for containerd, docker, runc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:3336-1

больше 4 лет назад

Security update for containerd, docker, runc

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-32760

containerd is a container runtime. A bug was found in containerd versions prior to 1.4.8 and 1.5.4 where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host’s filesystem. Changes to file permissions can deny access to the expected owner of the file, widen access to others, or set extended bits like setuid, setgid, and sticky. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. This bug has been fixed in containerd 1.5.4 and 1.4.8. As a workaround, ensure that users only pull images from trusted sources. Linux security modules (LSMs) like SELinux and AppArmor can limit the files potentially affected by this bug through policies and profiles that prevent containerd from interacting with specific files.

CVSS3: 5
0%
Низкий
больше 4 лет назад
redhat логотип
CVE-2021-32760

containerd is a container runtime. A bug was found in containerd versions prior to 1.4.8 and 1.5.4 where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host’s filesystem. Changes to file permissions can deny access to the expected owner of the file, widen access to others, or set extended bits like setuid, setgid, and sticky. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. This bug has been fixed in containerd 1.5.4 and 1.4.8. As a workaround, ensure that users only pull images from trusted sources. Linux security modules (LSMs) like SELinux and AppArmor can limit the files potentially affected by this bug through policies and profiles that prevent containerd from interacting with specific files.

CVSS3: 5.5
0%
Низкий
больше 4 лет назад
nvd логотип
CVE-2021-32760

containerd is a container runtime. A bug was found in containerd versions prior to 1.4.8 and 1.5.4 where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host’s filesystem. Changes to file permissions can deny access to the expected owner of the file, widen access to others, or set extended bits like setuid, setgid, and sticky. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. This bug has been fixed in containerd 1.5.4 and 1.4.8. As a workaround, ensure that users only pull images from trusted sources. Linux security modules (LSMs) like SELinux and AppArmor can limit the files potentially affected by this bug through policies and profiles that prevent containerd from interacting with specific files.

CVSS3: 5
0%
Низкий
больше 4 лет назад
msrc логотип
CVE-2021-32760

Archive package allows chmod of file outside of unpack target directory

CVSS3: 6.3
0%
Низкий
больше 4 лет назад
debian логотип
CVE-2021-32760

containerd is a container runtime. A bug was found in containerd versi ...

CVSS3: 5
0%
Низкий
больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:2412-1

Security update for containerd

0%
Низкий
больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:1081-1

Security update for containerd

0%
Низкий
больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2413-1

Security update for containerd

0%
Низкий
больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2412-1

Security update for containerd

0%
Низкий
больше 4 лет назад
github логотип
GHSA-c72p-9xmj-rx3w

Archive package allows chmod of file outside of unpack target directory

CVSS3: 5
0%
Низкий
больше 4 лет назад
oracle-oval логотип
ELSA-2021-9373

ELSA-2021-9373: containerd security update (IMPORTANT)

больше 4 лет назад
oracle-oval логотип
ELSA-2021-15790

ELSA-2021-15790: containerd security update (IMPORTANT)

больше 4 лет назад
fstec логотип
BDU:2021-04214

Уязвимость реализации команды chmod среды выполнения контейнеров Containerd, позволяющая нарушителю повысить свои привилегии

CVSS3: 5
0%
Низкий
больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:3506-1

Security update for containerd, docker, runc

больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:1404-1

Security update for containerd, docker, runc

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:3506-1

Security update for containerd, docker, runc

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:3336-1

Security update for containerd, docker, runc

больше 4 лет назад

Уязвимостей на страницу