{"schema_version":"1.7.2","id":"OESA-2023-1686","modified":"2023-09-28T11:06:01Z","published":"2023-09-28T11:06:01Z","upstream":["CVE-2021-33635","CVE-2021-33636","CVE-2021-33637","CVE-2021-33638"],"summary":"iSulad security update","details":"\r\n\r\nSecurity Fix(es):\r\n\r\nWhen malicious images are pulled by isula pull, attackers can execute arbitrary code.(CVE-2021-33635)\r\n\r\nWhen the isula load command is used to load malicious images, attackers can execute arbitrary code.(CVE-2021-33636)\r\n\r\nWhen the isula export command is used to export a container to an image and the container is controlled by an attacker, the attacker can escape the container.(CVE-2021-33637)\r\n\r\nWhen the isula cp command is used to copy files from a container to a host machine and the container is controlled by an attacker, the attacker can escape the container.(CVE-2021-33638)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP1","name":"iSulad","purl":"pkg:rpm/openEuler/iSulad\u0026distro=openEuler-20.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.8-20230216.115408.git40ea936a.oe1"}]}],"ecosystem_specific":{"aarch64":["iSulad-debugsource-2.0.8-20230216.115408.git40ea936a.oe1.aarch64.rpm","iSulad-debuginfo-2.0.8-20230216.115408.git40ea936a.oe1.aarch64.rpm","iSulad-2.0.8-20230216.115408.git40ea936a.oe1.aarch64.rpm"],"src":["iSulad-2.0.8-20230216.115408.git40ea936a.oe1.src.rpm"],"x86_64":["iSulad-2.0.8-20230216.115408.git40ea936a.oe1.x86_64.rpm","iSulad-debugsource-2.0.8-20230216.115408.git40ea936a.oe1.x86_64.rpm","iSulad-debuginfo-2.0.8-20230216.115408.git40ea936a.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:20.03-LTS-SP3","name":"iSulad","purl":"pkg:rpm/openEuler/iSulad\u0026distro=openEuler-20.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.18-13.oe1"}]}],"ecosystem_specific":{"aarch64":["iSulad-debugsource-2.0.18-13.oe1.aarch64.rpm","iSulad-2.0.18-13.oe1.aarch64.rpm","iSulad-debuginfo-2.0.18-13.oe1.aarch64.rpm"],"src":["iSulad-2.0.18-13.oe1.src.rpm"],"x86_64":["iSulad-debugsource-2.0.18-13.oe1.x86_64.rpm","iSulad-debuginfo-2.0.18-13.oe1.x86_64.rpm","iSulad-2.0.18-13.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:22.03-LTS","name":"iSulad","purl":"pkg:rpm/openEuler/iSulad\u0026distro=openEuler-22.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.1.3-6.oe2203sp2"}]}],"ecosystem_specific":{"aarch64":["iSulad-2.0.18-13.oe2203.aarch64.rpm","iSulad-debuginfo-2.0.18-13.oe2203.aarch64.rpm","iSulad-debugsource-2.0.18-13.oe2203.aarch64.rpm","iSulad-debuginfo-2.0.18-13.oe2203sp1.aarch64.rpm","iSulad-2.0.18-13.oe2203sp1.aarch64.rpm","iSulad-debugsource-2.0.18-13.oe2203sp1.aarch64.rpm","iSulad-2.1.3-6.oe2203sp2.aarch64.rpm","iSulad-debuginfo-2.1.3-6.oe2203sp2.aarch64.rpm","iSulad-debugsource-2.1.3-6.oe2203sp2.aarch64.rpm"],"src":["iSulad-2.0.18-13.oe2203.src.rpm","iSulad-2.0.18-13.oe2203sp1.src.rpm","iSulad-2.1.3-6.oe2203sp2.src.rpm"],"x86_64":["iSulad-2.0.18-13.oe2203.x86_64.rpm","iSulad-debuginfo-2.0.18-13.oe2203.x86_64.rpm","iSulad-debugsource-2.0.18-13.oe2203.x86_64.rpm","iSulad-2.0.18-13.oe2203sp1.x86_64.rpm","iSulad-debuginfo-2.0.18-13.oe2203sp1.x86_64.rpm","iSulad-debugsource-2.0.18-13.oe2203sp1.x86_64.rpm","iSulad-2.1.3-6.oe2203sp2.x86_64.rpm","iSulad-debuginfo-2.1.3-6.oe2203sp2.x86_64.rpm","iSulad-debugsource-2.1.3-6.oe2203sp2.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:22.03-LTS-SP1","name":"iSulad","purl":"pkg:rpm/openEuler/iSulad\u0026distro=openEuler-22.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.18-13.oe2203sp1"}]}],"ecosystem_specific":{"aarch64":["iSulad-debuginfo-2.0.18-13.oe2203sp1.aarch64.rpm","iSulad-2.0.18-13.oe2203sp1.aarch64.rpm","iSulad-debugsource-2.0.18-13.oe2203sp1.aarch64.rpm"],"src":["iSulad-2.0.18-13.oe2203sp1.src.rpm"],"x86_64":["iSulad-2.0.18-13.oe2203sp1.x86_64.rpm","iSulad-debuginfo-2.0.18-13.oe2203sp1.x86_64.rpm","iSulad-debugsource-2.0.18-13.oe2203sp1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:22.03-LTS-SP2","name":"iSulad","purl":"pkg:rpm/openEuler/iSulad\u0026distro=openEuler-22.03-LTS-SP2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.1.3-6.oe2203sp2"}]}],"ecosystem_specific":{"aarch64":["iSulad-2.1.3-6.oe2203sp2.aarch64.rpm","iSulad-debuginfo-2.1.3-6.oe2203sp2.aarch64.rpm","iSulad-debugsource-2.1.3-6.oe2203sp2.aarch64.rpm"],"src":["iSulad-2.1.3-6.oe2203sp2.src.rpm"],"x86_64":["iSulad-2.1.3-6.oe2203sp2.x86_64.rpm","iSulad-debuginfo-2.1.3-6.oe2203sp2.x86_64.rpm","iSulad-debugsource-2.1.3-6.oe2203sp2.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1686"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-33635"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-33636"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-33637"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-33638"}],"database_specific":{"severity":"Critical"}}