vulnerability

SUSE: CVE-2021-21284: SUSE Linux Security Advisory

Severity
3
CVSS
(AV:A/AC:L/Au:S/C:N/I:P/A:N)
Published
Feb 2, 2021
Added
Feb 12, 2021
Modified
Oct 26, 2022

Description

In Docker before versions 9.03.15, 20.10.3 there is a vulnerability involving the --userns-remap option in which access to remapped root allows privilege escalation to real root. When using "--userns-remap", if the root user in the remapped namespace has access to the host filesystem they can modify files under "/var/lib/docker/" that cause writing files with extended privileges. Versions 20.10.3 and 19.03.15 contain patches that prevent privilege escalation from remapped user.

Solution(s)

suse-upgrade-containerdsuse-upgrade-containerd-ctrsuse-upgrade-dockersuse-upgrade-docker-bash-completionsuse-upgrade-docker-fish-completionsuse-upgrade-docker-libnetworksuse-upgrade-docker-runcsuse-upgrade-docker-testsuse-upgrade-docker-zsh-completionsuse-upgrade-fishsuse-upgrade-fish-develsuse-upgrade-golang-github-docker-libnetworksuse-upgrade-runc
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.