Bug 1921286 (CVE-2021-21272)
| Summary: | CVE-2021-21272 oras: zip-slip vulnerability via oras-pull | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Pedro Sampaio <psampaio> |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED ERRATA | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | alazar, alitke, aos-bugs, bbennett, beth.white, bmontgom, bthurber, cnv-qe-bugs, dramseur, ecordell, eparis, fdeutsch, gghezzo, gparvin, hvyas, jburrell, jhadvig, jhrozek, jhunter, jlanford, jokerman, josorior, jramanat, jweiser, kmitts, lgamliel, mfilanov, mgala, mjudeiki, mrogers, nstielau, oyahud, pdhamdhe, phoracek, rfreiman, sponnaga, stcannon, stirabos, team-winc, thee, xiyuan |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | github.com/deislabs/oras 0.9.0 | Doc Type: | If docs needed, set a value |
| Doc Text: |
A flaw was found in oras. The directory support feature allows the downloaded gzipped tarballs to be automatically extracted to the user-specified directory where the tarball can have symbolic links and hard links. A well-crafted tarball or tarballs allow malicious artifact providers linking, writing, or overwriting specific files on the host filesystem outside of the user-specified directory unexpectedly with the same permissions as the user who runs `oras pull`.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2021-08-06 01:06:57 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 1927753, 1927754, 1927755, 1927756, 1927757, 1927758, 1927759, 1927760, 1927761, 1927762, 1927764, 1927765, 1927766, 1927767, 1927768, 1927769, 1930206, 1930207, 1930208, 1930209, 1930210, 1930235, 1930237, 1930771, 1930772, 1930774, 1983981 | ||
| Bug Blocks: | 1921287 | ||
|
Description
Pedro Sampaio
2021-01-27 20:47:42 UTC
Statement: A vulnerable version of github.com/deislabs/oras package is delivered in listed OpenShift Container Platform (OCP) and OpenShift Container Storage components, but the vulnerable code is not invoked, therefore these components are affected but with impact Low. External References: https://github.com/deislabs/oras/security/advisories/GHSA-g5v4-5x39-vwhx This issue has been addressed in the following products: Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 7 Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8 Via RHSA-2021:3016 https://access.redhat.com/errata/RHSA-2021:3016 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-21272 |