Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2021-2291

Опубликовано: 10 июн. 2021
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2021-2291: container-tools:2.0 security update (IMPORTANT)

runc [1.0.0-65.rc10]

  • fix CVE-2021-30465
  • Resolves: #1955650

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

Module container-tools:2.0 is enabled

buildah

1.11.6-8.0.1.module+el8.4.0+20172+38c78bba

buildah-tests

1.11.6-8.0.1.module+el8.4.0+20172+38c78bba

cockpit-podman

11-1.module+el8.4.0+20172+38c78bba

conmon

2.0.15-1.module+el8.4.0+20172+38c78bba

container-selinux

2.130.0-1.module+el8.4.0+20172+38c78bba

containernetworking-plugins

0.8.3-4.0.1.module+el8.4.0+20172+38c78bba

containers-common

0.1.41-4.0.1.module+el8.4.0+20172+38c78bba

crit

3.12-9.module+el8.4.0+20172+38c78bba

criu

3.12-9.module+el8.4.0+20172+38c78bba

fuse-overlayfs

0.7.8-1.module+el8.4.0+20172+38c78bba

podman

1.6.4-26.0.1.module+el8.4.0+20172+38c78bba

podman-docker

1.6.4-26.0.1.module+el8.4.0+20172+38c78bba

podman-remote

1.6.4-26.0.1.module+el8.4.0+20172+38c78bba

podman-tests

1.6.4-26.0.1.module+el8.4.0+20172+38c78bba

python-podman-api

1.2.0-0.2.gitd0a45fe.module+el8.4.0+20172+38c78bba

python3-criu

3.12-9.module+el8.4.0+20172+38c78bba

runc

1.0.0-65.rc10.module+el8.4.0+20187+0135169c

skopeo

0.1.41-4.0.1.module+el8.4.0+20172+38c78bba

skopeo-tests

0.1.41-4.0.1.module+el8.4.0+20172+38c78bba

slirp4netns

0.4.2-3.git21fdece.module+el8.4.0+20172+38c78bba

udica

0.2.1-2.module+el8.4.0+20172+38c78bba

Oracle Linux x86_64

Module container-tools:2.0 is enabled

buildah

1.11.6-8.0.1.module+el8.4.0+20172+38c78bba

buildah-tests

1.11.6-8.0.1.module+el8.4.0+20172+38c78bba

cockpit-podman

11-1.module+el8.4.0+20172+38c78bba

conmon

2.0.15-1.module+el8.4.0+20172+38c78bba

container-selinux

2.130.0-1.module+el8.4.0+20172+38c78bba

containernetworking-plugins

0.8.3-4.0.1.module+el8.4.0+20172+38c78bba

containers-common

0.1.41-4.0.1.module+el8.4.0+20172+38c78bba

crit

3.12-9.module+el8.4.0+20172+38c78bba

criu

3.12-9.module+el8.4.0+20172+38c78bba

fuse-overlayfs

0.7.8-1.module+el8.4.0+20172+38c78bba

podman

1.6.4-26.0.1.module+el8.4.0+20172+38c78bba

podman-docker

1.6.4-26.0.1.module+el8.4.0+20172+38c78bba

podman-remote

1.6.4-26.0.1.module+el8.4.0+20172+38c78bba

podman-tests

1.6.4-26.0.1.module+el8.4.0+20172+38c78bba

python-podman-api

1.2.0-0.2.gitd0a45fe.module+el8.4.0+20172+38c78bba

python3-criu

3.12-9.module+el8.4.0+20172+38c78bba

runc

1.0.0-65.rc10.module+el8.4.0+20187+0135169c

skopeo

0.1.41-4.0.1.module+el8.4.0+20172+38c78bba

skopeo-tests

0.1.41-4.0.1.module+el8.4.0+20172+38c78bba

slirp4netns

0.4.2-3.git21fdece.module+el8.4.0+20172+38c78bba

udica

0.2.1-2.module+el8.4.0+20172+38c78bba

Связанные CVE

Связанные уязвимости

CVSS3: 8.5
ubuntu
около 4 лет назад

runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.

CVSS3: 7.5
redhat
около 4 лет назад

runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.

CVSS3: 8.5
nvd
около 4 лет назад

runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.

CVSS3: 8.5
debian
около 4 лет назад

runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Dire ...

suse-cvrf
около 4 лет назад

Security update for runc

Уязвимость ELSA-2021-2291