First published: Wed Jan 05 2022(Updated: )
An incorrect permission assignment flaw was found in containerd. This flaw allows a local attacker to use a specially designed text file to read and write files outside of the container's scope.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Containerd | >=1.5.1<1.5.9 | |
Linuxfoundation Containerd | =1.5.0 | |
Linuxfoundation Containerd | =1.5.0-beta0 | |
Linuxfoundation Containerd | =1.5.0-beta1 | |
Linuxfoundation Containerd | =1.5.0-beta2 | |
Linuxfoundation Containerd | =1.5.0-beta3 | |
Linuxfoundation Containerd | =1.5.0-beta4 | |
Linuxfoundation Containerd | =1.5.0-rc0 | |
Linuxfoundation Containerd | =1.5.0-rc1 | |
Linuxfoundation Containerd | =1.5.0-rc2 | |
Linuxfoundation Containerd | =1.5.0-rc3 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
redhat/github.com/containerd/containerd | <1.5.9 | 1.5.9 |
>=1.5.1<1.5.9 | ||
=1.5.0 | ||
=1.5.0-beta0 | ||
=1.5.0-beta1 | ||
=1.5.0-beta2 | ||
=1.5.0-beta3 | ||
=1.5.0-beta4 | ||
=1.5.0-rc0 | ||
=1.5.0-rc1 | ||
=1.5.0-rc2 | ||
=1.5.0-rc3 | ||
=34 | ||
=35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-43816 is an incorrect permission assignment flaw found in containerd, a container runtime.
CVE-2021-43816 has a severity rating of 9.1 (Critical).
CVE-2021-43816 allows a local attacker to bind mount an unprivileged pod to the node via the hostPath volume on installations using SELinux with containerd as the backing container runtime interface (CRI).
Containerd versions 1.5.0-beta0 to 1.5.9 are affected by CVE-2021-43816.
To fix CVE-2021-43816, update containerd to version 1.5.9.