Lucene search

K
rosalinuxROSA LABROSA-SA-2023-2209
HistoryAug 08, 2023 - 7:51 a.m.

Advisory ROSA-SA-2023-2209

2023-08-0807:51:13
ROSA LAB
abf.rosalinux.ru
17
runc
rosa-chrome
cve-2021-43784
cve-2022-24769
cve-2022-29162
cve-2023-25809
cve-2023-27561
cve-2023-28642
vulnerability
remote access
denial-of-service

CVSS2

6

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.1

Confidence

High

EPSS

0.008

Percentile

81.9%

software: runc 1.1.7
OS: ROSA-CHROME

package_evr_string: runc-1.1.1.7-1.src.rpm

CVE-ID: CVE-2021-43784
BDU-ID: 2023-02652
CVE-Crit: MEDIUM
CVE-DESC.: A vulnerability in the Runc isolated container tool is related to integer overflow. Exploitation of the vulnerability allows an attacker acting remotely to gain access to sensitive data, compromise its integrity, and cause a denial-of-service condition
CVE-STATUS: Resolved
CVE-REV: To close, run the command: sudo dnf update runc

CVE-ID: CVE-2022-24769
BDU-ID: 2023-00215
CVE-Crit: MEDIUM.
CVE-DESC.: A vulnerability in the Containerd container runtime environment is related to the incorrect assignment of permissions for a critical resource. Exploitation of the vulnerability allows an attacker to gain access to sensitive data, compromise its integrity, and cause a denial-of-service condition
CVE-STATUS: Resolved
CVE-REV: To close, run the command: sudo dnf update runc

CVE-ID: CVE-2022-29162
BDU-ID: 2022-05793
CVE-Crit: MEDIUM
CVE-DESC.: A vulnerability in the ‘runc exec --cap’ command of the Runc isolated container startup tool is related to default permissions settings. Exploitation of the vulnerability allows an attacker to gain access to sensitive data, compromise its integrity, and cause a denial-of-service condition
CVE-STATUS: Resolved
CVE-REV: To close, run the command: sudo dnf update runc

CVE-ID: CVE-2023-25809
BDU-ID: 2023-03860
CVE-Crit: MEDIUM
CVE-DESC.: A vulnerability in the Runc isolated container launch tool is related to improper permission saving. Exploitation of the vulnerability allows an attacker to gain access to sensitive data, compromise its integrity, and cause a denial-of-service condition
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update runc

CVE-ID: CVE-2023-27561
BDU-ID: 2023-03863
CVE-Crit: MEDIUM.
CVE-DESC.: A vulnerability in the libcontainer/rootfs_linux.go component of the Runc isolated container startup tool is related to the use of an invalidly referenced name. Exploitation of the vulnerability allows an attacker to gain access to sensitive data, compromise its integrity, and cause a denial-of-service condition
CVE-STATUS: Resolved
CVE-REV: To close, run the command: sudo dnf update runc

CVE-ID: CVE-2023-28642
BDU-ID: 2023-03869
CVE-Crit: MEDIUM.
CVE-DESC.: A vulnerability in the Runc isolated container tool is related to incorrectly defining symbolic links before accessing a file. Exploitation of the vulnerability allows an attacker to access sensitive data, compromise its integrity, and cause a denial of service
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update runc

OSVersionArchitecturePackageVersionFilename
ROSAanynoarchrunc< 1.1.7UNKNOWN

CVSS2

6

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.1

Confidence

High

EPSS

0.008

Percentile

81.9%