Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-30465

Опубликовано: 19 мая 2021
Источник: redhat
CVSS3: 7.5

Описание

runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.

The runc package is vulnerable to a symlink exchange attack whereby an attacker can request a seemingly innocuous container configuration that results in the host filesystem being bind-mounted into the container. The highest threat from this vulnerability is to data confidentiality and integrity as well as to system availability.

Отчет

OpenShift Container Platform OCP 3.11 be default uses Docker from RHEL-7 extras repository. If using OCP 3.11 upgrade docker on all nodes to a fixed version from the RHEL-7 extras channel. CRI-O could be used instead of Docker on OCP 3.11 and in that case upgrade the runc version from the OCP rpm repository when it becomes available.

Меры по смягчению последствий

The impact of the vulnerability is reduced if SELinux is in enforcing mode using the container-selinux policy. The container-selinux policy is installed and enabled by default on RHEL 7 and 8, as well as OpenShift Container Platform 3.x and 4.x. Customers running affected versions of RHEL are strongly recommended to apply RPM updates from the RHEL 8 channel and RHEL 7 Extras channel as soon as errata becomes available.
Customers running affected versions of OpenShift Container Platform are strongly recommended to upgrade as soon as errata becomes available. Customers of OpenShift Online or OpenShift Dedicated have SELinux enabled in enforcing mode in every host across all clusters. Therefore, It is expected that OSO/OSD both have a reduced impact from this issue, with security patches made available during upcoming maintenance windows.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Advanced Cluster Management for Kubernetes 2multicloud-operators-subscriptionNot affected
Red Hat Advanced Cluster Management for Kubernetes 2multicloud-operators-subscription-releaseNot affected
Red Hat Enterprise Linux 8container-tools:1.0/runcOut of support scope
Red Hat Enterprise Linux 9runcNot affected
Red Hat Enterprise Linux 7 ExtrasdockerFixedRHSA-2021:214431.05.2021
Red Hat Enterprise Linux 7 ExtrasruncFixedRHSA-2021:214531.05.2021
Red Hat Enterprise Linux 8container-toolsFixedRHSA-2021:229108.06.2021
Red Hat Enterprise Linux 8container-toolsFixedRHSA-2021:237010.06.2021
Red Hat Enterprise Linux 8container-toolsFixedRHSA-2021:237110.06.2021
Red Hat Enterprise Linux 8.2 Extended Update Supportcontainer-toolsFixedRHSA-2021:229208.06.2021

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-367->CWE-59
https://bugzilla.redhat.com/show_bug.cgi?id=1954736runc: vulnerable to symlink exchange attack

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 8.5
ubuntu
около 4 лет назад

runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.

CVSS3: 8.5
nvd
около 4 лет назад

runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.

CVSS3: 8.5
debian
около 4 лет назад

runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Dire ...

suse-cvrf
около 4 лет назад

Security update for runc

rocky
около 4 лет назад

Important: container-tools:rhel8 security update

7.5 High

CVSS3

Уязвимость CVE-2021-30465