Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2020:1379

Опубликовано: 07 апр. 2020
Источник: rocky
Оценка: Important

Описание

Important: container-tools:rhel8 security and bug fix update

The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

Security Fix(es):

  • QEMU: Slirp: potential OOB access due to unsafe snprintf() usages (CVE-2020-8608)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • useradd and groupadd fail under rootless Buildah and podman [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1] (BZ#1803495)

  • Podman support for FIPS Mode requires a bind mount inside the container [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/buildah] (BZ#1804188)

  • Podman support for FIPS Mode requires a bind mount inside the container [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/podman] (BZ#1804194)

  • fuse-overlayfs segfault [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/fuse-overlayfs] (BZ#1805016)

  • buildah COPY command is slow when .dockerignore file is not present [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/buildah] (BZ#1806119)

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
cockpit-podmannoarch1.module+el8.5.0+770+e2f49861cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm
containernetworking-pluginsx86_644.module+el8.5.0+770+e2f49861containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
python-podman-apinoarch0.2.gitd0a45fe.module+el8.5.0+770+e2f49861python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm
slirp4netnsx86_643.git21fdece.module+el8.5.0+770+e2f49861slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm
udicanoarch2.module+el8.5.0+770+e2f49861udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm

Показывать по

Связанные CVE

Связанные уязвимости

CVSS3: 5.6
ubuntu
больше 5 лет назад

In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.

CVSS3: 5.6
redhat
больше 5 лет назад

In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.

CVSS3: 5.6
nvd
больше 5 лет назад

In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.

CVSS3: 5.6
debian
больше 5 лет назад

In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf ...

suse-cvrf
почти 5 лет назад

Security update for xen