vulnerability
SUSE: CVE-2021-21284: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
3 | (AV:A/AC:L/Au:S/C:N/I:P/A:N) | Feb 2, 2021 | Feb 12, 2021 | Oct 26, 2022 |
Severity
3
CVSS
(AV:A/AC:L/Au:S/C:N/I:P/A:N)
Published
Feb 2, 2021
Added
Feb 12, 2021
Modified
Oct 26, 2022
Description
In Docker before versions 9.03.15, 20.10.3 there is a vulnerability involving the --userns-remap option in which access to remapped root allows privilege escalation to real root. When using "--userns-remap", if the root user in the remapped namespace has access to the host filesystem they can modify files under "/var/lib/docker/" that cause writing files with extended privileges. Versions 20.10.3 and 19.03.15 contain patches that prevent privilege escalation from remapped user.
Solution(s)
suse-upgrade-containerdsuse-upgrade-containerd-ctrsuse-upgrade-dockersuse-upgrade-docker-bash-completionsuse-upgrade-docker-fish-completionsuse-upgrade-docker-libnetworksuse-upgrade-docker-runcsuse-upgrade-docker-testsuse-upgrade-docker-zsh-completionsuse-upgrade-fishsuse-upgrade-fish-develsuse-upgrade-golang-github-docker-libnetworksuse-upgrade-runc

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.