Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2019:4269

Опубликовано: 17 дек. 2019
Источник: rocky
Оценка: Important

Описание

Important: container-tools:rhel8 security and bug fix update

The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

Security Fix(es):

  • HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)

  • HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)

  • runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc (CVE-2019-16884)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • avc: podman run --security-opt label=type:svirt_qemu_net_t (BZ#1764318)

  • backport json-file logging support to 1.4.2 (BZ#1770176)

  • Selinux won't allow SCTP inter pod communication (BZ#1774382)

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
oci-systemd-hookx86_642.git2d0b8a3.module+el8.4.0+557+48ba8b2foci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
oci-umountx86_642.git87f9237.module+el8.4.0+557+48ba8b2foci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm

Показывать по

Связанные уязвимости

oracle-oval
больше 5 лет назад

ELSA-2019-4269: container-tools:ol8 security and bug fix update (IMPORTANT)

CVSS3: 7.5
ubuntu
больше 5 лет назад

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.

CVSS3: 6.5
redhat
больше 5 лет назад

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.

CVSS3: 7.5
nvd
больше 5 лет назад

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.

CVSS3: 7.5
msrc
почти 4 года назад

Описание отсутствует