Fedora 33 update for buildah, containers-common, crun, podman, runc



Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2021-20291
CWE-ID CWE-667
Exploitation vector Network
Public exploit N/A
Vulnerable software
Fedora
Operating systems & Components / Operating system

runc
Operating systems & Components / Operating system package or component

podman
Operating systems & Components / Operating system package or component

crun
Operating systems & Components / Operating system package or component

containers-common
Operating systems & Components / Operating system package or component

buildah
Operating systems & Components / Operating system package or component

Vendor Fedoraproject

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Improper locking

EUVDB-ID: #VU62797

Risk: Medium

CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2021-20291

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service attack (DoS) on the target system.

The vulnerability exists due to double-locking error. When a container image is processed, each layer is unpacked using `tar`. If one of those layers is not a valid `tar` archive this causes an error leading to an unexpected situation where the code indefinitely waits for the tar unpacked stream, which never finishes. An attacker could use this vulnerability to craft a malicious image, which when downloaded and stored by an application using containers/storage, would then cause a deadlock leading to a Denial of Service (DoS).

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Fedora: 33

runc: before 1.0.0-377.rc93.fc33

podman: before 3.1.2-1.fc33

crun: before 0.19.1-2.fc33

containers-common: before 1-15.fc33

buildah: before 1.20.1-4.fc33

CPE2.3 External links

https://bodhi.fedoraproject.org/updates/FEDORA-2021-ec00da7faa


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###