Summary: | <app-emulation/runc-1.0.0_rc95: Container breakout via directory traversal (CVE-2021-30465) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Thomas Deutschmann (RETIRED) <whissi> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | ago, gyakovlev, sam, williamh |
Priority: | Normal | Flags: | nattka:
sanity-check-
|
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://github.com/opencontainers/runc/security/advisories/GHSA-c3xm-pvg7-gh7r | ||
See Also: | https://bugs.gentoo.org/show_bug.cgi?id=775329 | ||
Whiteboard: | B4 [glsa+ cve] | ||
Package list: |
app-emulation/containerd-1.4.6 amd64 arm64 ppc64
app-emulation/docker-20.10.7 amd64 arm64 ppc64
app-emulation/docker-cli-20.10.7 amd64 arm64 ppc64
app-emulation/docker-proxy-0.8.0_p20210525 amd64 arm64 ppc64
app-emulation/runc-1.0.0_rc95 amd64 arm64 ppc64
sys-process/tini-0.19.0 ppc64
|
Runtime testing required: | --- |
Bug Depends on: | |||
Bug Blocks: | 775329 |
Description
Thomas Deutschmann (RETIRED)
2021-05-14 18:35:48 UTC
Description: "runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition." bumped to rc95 in https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=a17208eaff0d8fefee0ad5eb5b217af17f613d10 ppc64 done *** Bug 791064 has been marked as a duplicate of this bug. *** amd64 done. arm64 done all arches done cleanup done Unable to check for sanity:
> no match for package: sys-process/tini-0.19.0
GLSA request filed. This issue was resolved and addressed in GLSA 202107-26 at https://security.gentoo.org/glsa/202107-26 by GLSA coordinator John Helmert III (ajak). |