Описание
Moderate: container-tools:rhel8 security, bug fix, and enhancement update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
-
runc: volume mount race condition with shared mounts leads to information leak/integrity manipulation (CVE-2019-19921)
-
containers/image: Container images read entire image manifest into memory (CVE-2020-1702)
-
podman: incorrectly allows existing files in volumes to be overwritten by a container when it is created (CVE-2020-1726)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Затронутые продукты
Rocky Linux 8
Связанные CVE
Исправления
- Red Hat - 1703245
- Red Hat - 1717357
- Red Hat - 1731107
- Red Hat - 1732704
- Red Hat - 1732713
- Red Hat - 1748519
- Red Hat - 1749999
- Red Hat - 1754744
- Red Hat - 1754763
- Red Hat - 1755119
- Red Hat - 1756919
- Red Hat - 1757693
- Red Hat - 1757845
- Red Hat - 1763454
- Red Hat - 1766774
- Red Hat - 1768930
- Red Hat - 1769469
- Red Hat - 1771990
- Red Hat - 1774755
- Red Hat - 1775307
Связанные уязвимости
ELSA-2020-1650: container-tools:ol8 security, bug fix, and enhancement update (MODERATE)
runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vulnerability does not affect Docker due to an implementation detail that happens to block the attack.)
runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vulnerability does not affect Docker due to an implementation detail that happens to block the attack.)
runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vulnerability does not affect Docker due to an implementation detail that happens to block the attack.)
runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalat ...