[ASA-202107-70] containerd: directory traversal

Jonas Witschel diabonas at archlinux.org
Fri Jul 30 22:30:31 UTC 2021

Arch Linux Security Advisory ASA-202107-70

Severity: Medium
Date    : 2021-07-27
CVE-ID  : CVE-2021-32760
Package : containerd
Type    : directory traversal
Remote  : No
Link    : https://security.archlinux.org/AVG-2174


The package containerd before version 1.5.4-1 is vulnerable to
directory traversal.


Upgrade to 1.5.4-1.

# pacman -Syu "containerd>=1.5.4-1"

The problem has been fixed upstream in version 1.5.4.


As a workaround, ensure that users only pull images from trusted
sources. Linux security modules (LSMs) like AppArmor can limit the
files potentially affected by this bug through policies and profiles
that prevent containerd from interacting with specific files.


A bug was found in containerd version prior to 1.5.4 where pulling and
extracting a specially-crafted container image can result in Unix file
permission changes for existing files in the host's filesystem. Changes
to file permissions can deny access to the expected owner of the file,
widen access to others, or set extended bits like setuid, setgid, and
sticky. This bug does not directly allow files to be read, modified, or
executed without an additional cooperating process.


A crafted container image could change file permissions on the host
system, leading to potential denial of service or information


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20210731/f6c2876d/attachment.sig>

More information about the arch-security mailing list