Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2021:2371

Опубликовано: 10 июн. 2021
Источник: rocky
Оценка: Important

Описание

Important: container-tools:rhel8 security update

The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

Security Fix(es):

  • runc: vulnerable to symlink exchange attack (CVE-2021-30465)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
cockpit-podmannoarch2.module+el8.7.0+1076+9b1c11c1cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm
conmonx86_643.module+el8.7.0+1076+9b1c11c1conmon-2.0.26-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
containernetworking-pluginsx86_641.module+el8.7.0+1076+9b1c11c1containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
critx86_641.module+el8.7.0+1076+9b1c11c1crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
criux86_641.module+el8.7.0+1076+9b1c11c1criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
libslirpx86_641.module+el8.7.0+1076+9b1c11c1libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
libslirp-develx86_641.module+el8.7.0+1076+9b1c11c1libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
python3-criux86_641.module+el8.7.0+1076+9b1c11c1python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
slirp4netnsx86_641.module+el8.7.0+1076+9b1c11c1slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm
udicanoarch1.module+el8.7.0+1076+9b1c11c1udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 8.5
ubuntu
около 4 лет назад

runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.

CVSS3: 7.5
redhat
около 4 лет назад

runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.

CVSS3: 8.5
nvd
около 4 лет назад

runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.

CVSS3: 8.5
debian
около 4 лет назад

runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Dire ...

suse-cvrf
около 4 лет назад

Security update for runc