First published: Mon Mar 25 2024(Updated: )
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in openEuler iSulad on Linux allows Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions. This vulnerability is associated with program files https://gitee.Com/openeuler/iSulad/blob/master/src/cmd/isulad/main.C. This issue affects iSulad: 2.0.18-13, from 2.1.4-1 through 2.1.4-2.
Credit: securities@openeuler.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenAtom OpenEuler | =2.0.18-13>=2.1.4-1<2.1.4-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-33632 has been assigned a severity level that indicates a moderate risk due to the potential for unauthorized access or control.
To mitigate CVE-2021-33632, update openEuler iSulad to version 2.1.4-2 or higher.
CVE-2021-33632 affects openEuler iSulad versions from 2.0.18-13 up to and including 2.1.4-1.
Exploitation of CVE-2021-33632 can lead to race condition vulnerabilities that may allow unauthorized access or execution of arbitrary code.
Yes, a patch for CVE-2021-33632 is available in the latest release of openEuler iSulad.