ASA-202107-70: containerd: directory traversal
Arch Linux Security Advisory ASA-202107-70
=========================================
Severity: Medium
Date : 2021-07-27
CVE-ID : CVE-2021-32760
Package : containerd
Type : directory traversal
Remote : No
Link : https://security.archlinux.org/AVG-2174
Summary
======
The package containerd before version 1.5.4-1 is vulnerable to
directory traversal.
Resolution
=========
Upgrade to 1.5.4-1.
# pacman -Syu "containerd>=1.5.4-1"
The problem has been fixed upstream in version 1.5.4.
Workaround
=========
As a workaround, ensure that users only pull images from trusted
sources. Linux security modules (LSMs) like AppArmor can limit the
files potentially affected by this bug through policies and profiles
that prevent containerd from interacting with specific files.
Description
==========
A bug was found in containerd version prior to 1.5.4 where pulling and
extracting a specially-crafted container image can result in Unix file
permission changes for existing files in the host's filesystem. Changes
to file permissions can deny access to the expected owner of the file,
widen access to others, or set extended bits like setuid, setgid, and
sticky. This bug does not directly allow files to be read, modified, or
executed without an additional cooperating process.
Impact
=====
A crafted container image could change file permissions on the host
system, leading to potential denial of service or information
disclosure.
References
=========
https://github.com/containerd/containerd/security/advisories/GHSA-c72p-9xmj-rx3w
https://github.com/containerd/containerd/commit/37a44de17d5d09e258e3c8c29d32ae99797e7c11
https://security.archlinux.org/CVE-2021-32760
A containerd security update has been released for Arch Linux.