Incorrect Permission Assignment for Critical Resource Affecting ctop package, versions <0.7.7-r13
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-WOLFILATEST-CTOP-6597047
- published 11 Apr 2024
- disclosed 19 Jul 2021
Introduced: 19 Jul 2021
CVE-2021-32760 Open this link in a new tabHow to fix?
Upgrade Wolfi
ctop
to version 0.7.7-r13 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream ctop
package and not the ctop
package as distributed by Wolfi
.
See How to fix?
for Wolfi
relevant fixed versions and status.
containerd is a container runtime. A bug was found in containerd versions prior to 1.4.8 and 1.5.4 where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host’s filesystem. Changes to file permissions can deny access to the expected owner of the file, widen access to others, or set extended bits like setuid, setgid, and sticky. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. This bug has been fixed in containerd 1.5.4 and 1.4.8. As a workaround, ensure that users only pull images from trusted sources. Linux security modules (LSMs) like SELinux and AppArmor can limit the files potentially affected by this bug through policies and profiles that prevent containerd from interacting with specific files.
References
- https://github.com/containerd/containerd/releases/tag/v1.4.8
- https://github.com/containerd/containerd/releases/tag/v1.5.4
- https://github.com/containerd/containerd/security/advisories/GHSA-c72p-9xmj-rx3w
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDMNDPJJTP3J5GOEDB66F6MGXUTRG3Y3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DDMNDPJJTP3J5GOEDB66F6MGXUTRG3Y3/
- https://security.gentoo.org/glsa/202401-31