漏洞信息详情
containerd 路径遍历漏洞
漏洞简介
containerd是美国阿帕奇(Apache)基金会的一个容器守护进程。该进程根据 RunC OCI 规范负责控制宿主机上容器的完整周期。
containerd 存在路径遍历漏洞,该漏洞源于容器根目录和一些插件的权限没有受到足够的限制。攻击者可利用该漏洞使得没有特权的Linux用户可以遍历目录内容和执行程序。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://github.com/containerd/containerd/security/advisories/GHSA-c2h3-6mxw-7mvq
参考网址
来源:MISC
链接:https://github.com/containerd/containerd/commit/5b46e404f6b9f661a205e28d59c982d3634148f8
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/B5Q6G6I4W5COQE25QMC7FJY3I3PAYFBB/
来源:CONFIRM
链接:https://github.com/containerd/containerd/security/advisories/GHSA-c2h3-6mxw-7mvq
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/ZNFADTCHHYWVM6W4NJ6CB4FNFM2VMBIB/
来源:DEBIAN
链接:https://www.debian.org/security/2021/dsa-5002
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3275
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021100503
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3385
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3550
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/164388/Ubuntu-Security-Notice-USN-5100-1.html
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021110812
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2021-41103
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/containerd-code-execution-via-Directory-Traversal-36581
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3705
受影响实体
暂无
补丁
- containerd 路径遍历漏洞的修复措施<!--2021-10-4-->
还没有评论,来说两句吧...