Lucene search

K
rosalinuxROSA LABROSA-SA-2024-2393
HistoryApr 11, 2024 - 7:16 a.m.

Advisory ROSA-SA-2024-2393

2024-04-1107:16:35
ROSA LAB
abf.rosalinux.ru
5
runc 1.0.0
high severity
access control
configuration vulnerabilities
rosa-sa-2024-2393
rosa-server79
cve-2019-19921
cve-2021-30465
cve-2024-21626
libcontainer/rootfs_linux.go
yum update.

8.6 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

9 High

AI Score

Confidence

High

6 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

0.051 Low

EPSS

Percentile

92.8%

Software: runc 1.0.0
OS: rosa-server79

package_evr_string: runc-1.0.0.0-70.rc10.res7

CVE-ID: CVE-2019-19921
BDU-ID: None
CVE-Crit: HIGH
CVE-DESC.: runc has improper access control leading to elevated privileges associated with libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to create two containers with customized volume mount configurations and be able to run their own images. (This vulnerability does not affect Docker due to an implementation detail that blocks the attack.)
CVE-STATUS: Fixed
CVE-REV: To close, run the yum update runc command

CVE-ID: CVE-2021-30465
BDU-ID: 2021-03670
CVE-Crit: HIGH
CVE-DESC.: A configuration vulnerability in the runc isolated container startup tool exists due to an incorrect restriction on the path name of a restricted directory. Exploitation of the vulnerability could allow an attacker acting remotely to impact the confidentiality, integrity, and availability of protected information
CVE-STATUS: Resolved
CVE-REV: To close, run the yum update runc command

CVE-ID: CVE-2024-21626
BDU-ID: 2024-00973
CVE-Crit: HIGH
CVE-DESC.: A vulnerability in the Runc isolated container launch tool is related to a flaw in the controlled area delimitations of the system. Exploitation of the vulnerability could allow an attacker to execute arbitrary code outside of the isolated program environment by overwriting executable files
CVE-STATUS: Fixed
CVE-REV: To close, run the yum update runc command

OSVersionArchitecturePackageVersionFilename
rosaanynoarchrunc< 1.0.0UNKNOWN

8.6 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

9 High

AI Score

Confidence

High

6 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

0.051 Low

EPSS

Percentile

92.8%