- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202107-26
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Low
Title: runC: Container breakout
Date: July 10, 2021
Bugs: #790257
ID: 202107-26
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
A vulnerability has been found in runC which could result in privilege escalation.
Background
==========
runC is a CLI tool for spawning and running containers according to the
OCI specification.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 app-emulation/runc < 1.0.0_rc95 >= 1.0.0_rc95
Description
===========
A vulnerability in runC could allow an attacker to achieve privilege
escalation if specific mount configuration prerequisites are satisfied.
Impact
======
An attacker may be able to escalation privileges to gain access to the
host system.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All runC users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-emulation/runc-1.0.0_rc95"
References
==========
[ 1 ] CVE-2021-30465
https://nvd.nist.gov/vuln/detail/CVE-2021-30465
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202107-26
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2021 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
-----BEGIN PGP SIGNATURE-----
iQIzBAABCAAdFiEElFuPenBj6NvNLoABXP0dAeB+IzgFAmDpD3YACgkQXP0dAeB+ IzjDOQ//aHKC0exs2DLYvv/Fn3ZUZ5g0AqGv63e0cOnVrkuI/NHrZEDAwFiLX5pj 2+AujhfZVkYpe4CXpFJpB0J2UUD9pxkvRoONIeWu7PnPSAQqWdZVZ7cmYUEbTn/a ASbYH2uf4DIpccPPtvzaVJRqOlPjNy8k0QTA8lrN+8MdvYK1TBvkc67KmWi1rVrN e4U6O2+cM2+CzM0Mn8782I/UFePHhjVFinkv2tY6mTKFREfh4tDiVf0hkdlCUook 7jcr/R5uDrVKsOxejSKAubUUftYQa12zewfmegyjNhbdsXQaFltNO/IRKZjf7maP Njt8eY+4AHrGwY8HSYhLA0jlS+1MABZjCr0mn07QK7rMpu6RAHlfff7dGgkj1lSi jag1eGqqK+T51klB2yZBiCUd38J+8btRDH9mGWpB3MksWbV8HxYMmH+U3F3VIfYF YrBlsxAMWGsNkEyoT4VUASehP42Pi34IoSUcGQxrhE3YlsPSME9tC43RpG1ED5RB wUhwpnSasD+g7L+qVTdZUD/08hhoJse7uHvwHLilltjKin1bGogmPKqHSg2Vna/J he4cmZBQZihqju3VKKUXfMm3H+CbTi3HCCM1+CNt4+nLM/zlY9CCx7jyw1rs0W3t kjJyorci6ss0CMwXgnmfFCuw5u3NYjE7zlOexgQS00MZoPrH+90=
=KskV
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)