First published: Tue Mar 16 2021(Updated: )
A deadlock vulnerability was found in 'github.com/containers/storage' in versions before 1.28.1. When a container image is processed, each layer is unpacked using `tar`. If one of those layers is not a valid `tar` archive this causes an error leading to an unexpected situation where the code indefinitely waits for the tar unpacked stream, which never finishes. An attacker could use this vulnerability to craft a malicious image, which when downloaded and stored by an application using containers/storage, would then cause a deadlock leading to a Denial of Service (DoS).
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/podman | <2:4.2.0-3.el9 | 2:4.2.0-3.el9 |
redhat/skopeo | <2:1.9.2-1.el9 | 2:1.9.2-1.el9 |
redhat/buildah | <1:1.27.0-2.el9 | 1:1.27.0-2.el9 |
redhat/cri-o | <0:1.20.2-6.rhaos4.7.gitf1d5201.el8 | 0:1.20.2-6.rhaos4.7.gitf1d5201.el8 |
redhat/openshift | <0:4.7.0-202104090228.p0.git.97111.77863f8.el8 | 0:4.7.0-202104090228.p0.git.97111.77863f8.el8 |
redhat/containers/storage | <1.28.1 | 1.28.1 |
storage project storage | <1.28.1 | |
redhat openshift container platform | =4.0 | |
Red Hat Enterprise Linux | =8.0 | |
Fedora | =33 | |
Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-20291 has been classified with a moderate severity level due to the potential for deadlock and system hang upon processing erroneous container images.
To fix CVE-2021-20291, upgrade to the designated patched versions of affected packages, such as containers/storage version 1.28.1 or higher.
CVE-2021-20291 affects various software packages including Podman, Skopeo, Buildah, and CRI-O, particularly those versions before the recommended updates.
The CVE-2021-20291 vulnerability is caused by a deadlock issue arising when a non-valid tar archive is processed while unpacking container image layers.
CVE-2021-20291 is not directly exploitable remotely as it requires processing of container images under specific erroneous conditions.