Описание
runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.
The runc package is vulnerable to a symlink exchange attack whereby an attacker can request a seemingly innocuous container configuration that results in the host filesystem being bind-mounted into the container. The highest threat from this vulnerability is to data confidentiality and integrity as well as to system availability.
Отчет
OpenShift Container Platform OCP 3.11 be default uses Docker from RHEL-7 extras repository. If using OCP 3.11 upgrade docker on all nodes to a fixed version from the RHEL-7 extras channel. CRI-O could be used instead of Docker on OCP 3.11 and in that case upgrade the runc version from the OCP rpm repository when it becomes available.
Меры по смягчению последствий
The impact of the vulnerability is reduced if SELinux is in enforcing mode using the container-selinux policy. The container-selinux policy is installed and enabled by default on RHEL 7 and 8, as well as OpenShift Container Platform 3.x and 4.x.
Customers running affected versions of RHEL are strongly recommended to apply RPM updates from the RHEL 8 channel and RHEL 7 Extras channel as soon as errata becomes available.
Customers running affected versions of OpenShift Container Platform are strongly recommended to upgrade as soon as errata becomes available.
Customers of OpenShift Online or OpenShift Dedicated have SELinux enabled in enforcing mode in every host across all clusters. Therefore, It is expected that OSO/OSD both have a reduced impact from this issue, with security patches made available during upcoming maintenance windows.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Advanced Cluster Management for Kubernetes 2 | multicloud-operators-subscription | Not affected | ||
Red Hat Advanced Cluster Management for Kubernetes 2 | multicloud-operators-subscription-release | Not affected | ||
Red Hat Enterprise Linux 8 | container-tools:1.0/runc | Out of support scope | ||
Red Hat Enterprise Linux 9 | runc | Not affected | ||
Red Hat Enterprise Linux 7 Extras | docker | Fixed | RHSA-2021:2144 | 31.05.2021 |
Red Hat Enterprise Linux 7 Extras | runc | Fixed | RHSA-2021:2145 | 31.05.2021 |
Red Hat Enterprise Linux 8 | container-tools | Fixed | RHSA-2021:2291 | 08.06.2021 |
Red Hat Enterprise Linux 8 | container-tools | Fixed | RHSA-2021:2370 | 10.06.2021 |
Red Hat Enterprise Linux 8 | container-tools | Fixed | RHSA-2021:2371 | 10.06.2021 |
Red Hat Enterprise Linux 8.2 Extended Update Support | container-tools | Fixed | RHSA-2021:2292 | 08.06.2021 |
Показывать по
Дополнительная информация
Статус:
7.5 High
CVSS3
Связанные уязвимости
runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.
runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.
runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Dire ...
7.5 High
CVSS3