SB2021101264 - SUSE update for containerd, docker, runc 



SB2021101264 - SUSE update for containerd, docker, runc

Published: October 12, 2021 Updated: July 5, 2024

Security Bulletin ID SB2021101264
Severity
Medium
Patch available
YES
Number of vulnerabilities 6
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 33% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 6 secuirty vulnerabilities.


1) Security features bypass (CVE-ID: CVE-2021-30465)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to the security features bypass issue. A remote authenticated attacker on the local network can perform a symlink exchange attack and host filesystem being bind-mounted into the container.


2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-32760)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to archive package allows chmod of file outside of unpack target directory. A remote attacker can deny access to the expected owner of the file, widen access to others, or set extended bits like setuid, setgid, and sticky.


3) Improper Preservation of Permissions (CVE-ID: CVE-2021-41089)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions, which leads to security restrictions bypass and privilege escalation.


4) Improper Preservation of Permissions (CVE-ID: CVE-2021-41091)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions, which leads to security restrictions bypass and privilege escalation.


5) Information disclosure (CVE-ID: CVE-2021-41092)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application. A remote attacker can gain unauthorized access to sensitive information on the system.


6) Incorrect default permissions (CVE-ID: CVE-2021-41103)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to incorrect default permissions for container root directories and some plugins. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host can discover, read, and modify those files.


Remediation

Install update from vendor's website.