Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2021-21334

Publication date 5 March 2021

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

6.3 · Medium

Score breakdown

In containerd (an industry-standard container runtime) before versions 1.3.10 and 1.4.4, containers launched through containerd's CRI implementation (through Kubernetes, crictl, or any other pod/container client that uses the containerd CRI service) that share the same image may receive incorrect environment variables, including values that are defined for other containers. If the affected containers have different security contexts, this may allow sensitive information to be unintentionally shared. If you are not using containerd's CRI implementation (through one of the mechanisms described above), you are not vulnerable to this issue. If you are not launching multiple containers or Kubernetes pods from the same image which have different environment variables, you are not vulnerable to this issue. If you are not launching multiple containers or Kubernetes pods from the same image in rapid succession, you have reduced likelihood of being vulnerable to this issue This vulnerability has been fixed in containerd 1.3.10 and containerd 1.4.4. Users should update to these versions.

Status

Package Ubuntu Release Status
containerd 24.10 oracular
Fixed 1.4.4-0ubuntu1
24.04 LTS noble
Fixed 1.4.4-0ubuntu1
23.10 mantic
Fixed 1.4.4-0ubuntu1
23.04 lunar
Fixed 1.4.4-0ubuntu1
22.10 kinetic
Fixed 1.4.4-0ubuntu1
22.04 LTS jammy
Fixed 1.4.4-0ubuntu1
21.10 impish
Fixed 1.4.4-0ubuntu1
21.04 hirsute
Fixed 1.4.4-0ubuntu1
20.10 groovy
Fixed 1.3.7-0ubuntu3.3
20.04 LTS focal
Fixed 1.3.3-0ubuntu2.3
18.04 LTS bionic
Fixed 1.5.2-0ubuntu1~18.04.2
16.04 LTS xenial
Vulnerable
14.04 LTS trusty Not in release

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
containerd

Severity score breakdown

Parameter Value
Base score 6.3 · Medium
Attack vector Network
Attack complexity High
Privileges required Low
User interaction None
Scope Changed
Confidentiality High
Integrity impact None
Availability impact None
Vector CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

References

Related Ubuntu Security Notices (USN)

    • USN-4881-1
    • containerd vulnerability
    • 17 March 2021

Other references