CVE-2021-43816 – Improper Preservation of Permissions in containerd
https://notcve.org/view.php?id=CVE-2021-43816
containerd is an open source container runtime. On installations using SELinux, such as EL8 (CentOS, RHEL), Fedora, or SUSE MicroOS, with containerd since v1.5.0-beta.0 as the backing container runtime interface (CRI), an unprivileged pod scheduled to the node may bind mount, via hostPath volume, any privileged, regular file on disk for complete read/write access (sans delete). Such is achieved by placing the in-container location of the hostPath volume mount at either `/etc/hosts`, `/etc/hostname`, or `/etc/resolv.conf`. These locations are being relabeled indiscriminately to match the container process-label which effectively elevates permissions for savvy containers that would not normally be able to access privileged host files. This issue has been resolved in version 1.5.9. • https://github.com/containerd/containerd/commit/a731039238c62be081eb8c31525b988415745eea https://github.com/containerd/containerd/issues/6194 https://github.com/containerd/containerd/security/advisories/GHSA-mvff-h3cj-wj9c https://github.com/dweomer/containerd/commit/f7f08f0e34fb97392b0d382e58916d6865100299 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GD5GH7NMK5VJMA2Y5CYB5O5GTPYMWMLX https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MPDIZMI7ZPERSZE2XO265UCK5IWM7CID https: • CWE-281: Improper Preservation of Permissions •
CVE-2021-43832 – Improper Access Control in spinnaker
https://notcve.org/view.php?id=CVE-2021-43832
Spinnaker is an open source, multi-cloud continuous delivery platform. Spinnaker has improper permissions allowing pipeline creation & execution. This lets an arbitrary user with access to the gate endpoint to create a pipeline and execute it without authentication. If users haven't setup Role-based access control (RBAC) with-in spinnaker, this enables remote execution and access to deploy almost any resources on any account. Patches are available on the latest releases of the supported branches and users are advised to upgrade as soon as possible. • https://github.com/spinnaker/spinnaker/security/advisories/GHSA-9h7c-rfrp-gvgp • CWE-306: Missing Authentication for Critical Function •
CVE-2021-39143 – Path Traversal in spinnaker
https://notcve.org/view.php?id=CVE-2021-39143
Spinnaker is an open source, multi-cloud continuous delivery platform. A path traversal vulnerability was discovered in uses of TAR files by AppEngine for deployments. This uses a utility to extract files locally for deployment without validating the paths in that deployment don't override system files. This would allow an attacker to override files on the container, POTENTIALLY introducing a MITM type attack vector by replacing libraries or injecting wrapper files. Users are advised to update as soon as possible. • https://github.com/spinnaker/spinnaker/security/advisories/GHSA-34jx-3vmr-56v8 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2021-45701
https://notcve.org/view.php?id=CVE-2021-45701
An issue was discovered in the tremor-script crate before 0.11.6 for Rust. A patch operation may result in a use-after-free. Se ha detectado un problema en la crate tremor-script versiones anteriores a 0.11.6 para Rust. Una operación de parcheado puede resultar en un uso de memoria previamente liberada • https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tremor-script/RUSTSEC-2021-0111.md https://rustsec.org/advisories/RUSTSEC-2021-0111.html • CWE-416: Use After Free •
CVE-2021-45702
https://notcve.org/view.php?id=CVE-2021-45702
An issue was discovered in the tremor-script crate before 0.11.6 for Rust. A merge operation may result in a use-after-free. Se ha detectado un problema en la crate tremor-script versiones anteriores a 0.11.6 para Rust. Una operación de fusión puede resultar en un uso de memoria previamente liberada • https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tremor-script/RUSTSEC-2021-0111.md https://rustsec.org/advisories/RUSTSEC-2021-0111.html • CWE-416: Use After Free •