Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2022:1507-1

Опубликовано: 03 мая 2022
Источник: suse-cvrf

Описание

Security update for containerd, docker

This update for containerd, docker fixes the following issues:

  • CVE-2022-24769: Fixed incorrect default inheritable capabilities (bsc#1197517).
  • CVE-2022-23648: Fixed directory traversal issue (bsc#1196441).
  • CVE-2021-41190: Fixed parsing confusions in OCI manifest and index (bsc#1193273).
  • CVE-2022-27191: Fixed a crash in a golang.org/x/crypto/ssh server (bsc#1197284).
  • CVE-2021-43565: Fixed a panic in golang.org/x/crypto by empty plaintext packet (bsc#1193930).

Список пакетов

Image SLES12-SP5-Azure-Basic-On-Demand
containerd-1.5.11-16.57.1
docker-20.10.14_ce-98.80.1
Image SLES12-SP5-Azure-Standard-On-Demand
containerd-1.5.11-16.57.1
docker-20.10.14_ce-98.80.1
Image SLES12-SP5-EC2-ECS-On-Demand
containerd-1.5.11-16.57.1
docker-20.10.14_ce-98.80.1
Image SLES12-SP5-EC2-On-Demand
containerd-1.5.11-16.57.1
docker-20.10.14_ce-98.80.1
Image SLES12-SP5-GCE-On-Demand
containerd-1.5.11-16.57.1
docker-20.10.14_ce-98.80.1
SUSE Linux Enterprise Module for Containers 12
containerd-1.5.11-16.57.1
docker-20.10.14_ce-98.80.1

Описание

The OCI Distribution Spec project defines an API protocol to facilitate and standardize the distribution of content. In the OCI Distribution Specification version 1.0.0 and prior, the Content-Type header alone was used to determine the type of document during push and pull operations. Documents that contain both "manifests" and "layers" fields could be interpreted as either a manifest or an index in the absence of an accompanying Content-Type header. If a Content-Type header changed between two pulls of the same digest, a client may interpret the resulting content differently. The OCI Distribution Specification has been updated to require that a mediaType value present in a manifest or index match the Content-Type header used during the push and pull operations. Clients pulling from a registry may distrust the Content-Type header and reject an ambiguous document that contains both "manifests" and "layers" fields or "manifests" and "config" fields if they are unable to update to version 1.0.1 of the spec.


Затронутые продукты
Image SLES12-SP5-Azure-Basic-On-Demand:containerd-1.5.11-16.57.1
Image SLES12-SP5-Azure-Basic-On-Demand:docker-20.10.14_ce-98.80.1
Image SLES12-SP5-Azure-Standard-On-Demand:containerd-1.5.11-16.57.1
Image SLES12-SP5-Azure-Standard-On-Demand:docker-20.10.14_ce-98.80.1

Ссылки

Описание

The x/crypto/ssh package before 0.0.0-20211202192323-5770296d904e of golang.org/x/crypto allows an attacker to panic an SSH server.


Затронутые продукты
Image SLES12-SP5-Azure-Basic-On-Demand:containerd-1.5.11-16.57.1
Image SLES12-SP5-Azure-Basic-On-Demand:docker-20.10.14_ce-98.80.1
Image SLES12-SP5-Azure-Standard-On-Demand:containerd-1.5.11-16.57.1
Image SLES12-SP5-Azure-Standard-On-Demand:docker-20.10.14_ce-98.80.1

Ссылки

Описание

containerd is a container runtime available as a daemon for Linux and Windows. A bug was found in containerd prior to versions 1.6.1, 1.5.10, and 1.14.12 where containers launched through containerd's CRI implementation on Linux with a specially-crafted image configuration could gain access to read-only copies of arbitrary files and directories on the host. This may bypass any policy-based enforcement on container setup (including a Kubernetes Pod Security Policy) and expose potentially sensitive information. Kubernetes and crictl can both be configured to use containerd's CRI implementation. This bug has been fixed in containerd 1.6.1, 1.5.10, and 1.4.12. Users should update to these versions to resolve the issue.


Затронутые продукты
Image SLES12-SP5-Azure-Basic-On-Demand:containerd-1.5.11-16.57.1
Image SLES12-SP5-Azure-Basic-On-Demand:docker-20.10.14_ce-98.80.1
Image SLES12-SP5-Azure-Standard-On-Demand:containerd-1.5.11-16.57.1
Image SLES12-SP5-Azure-Standard-On-Demand:docker-20.10.14_ce-98.80.1

Ссылки

Описание

Moby is an open-source project created by Docker to enable and accelerate software containerization. A bug was found in Moby (Docker Engine) prior to version 20.10.14 where containers were incorrectly started with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during `execve(2)`. Normally, when executable programs have specified permitted file capabilities, otherwise unprivileged users and processes can execute those programs and gain the specified file capabilities up to the bounding set. Due to this bug, containers which included executable programs with inheritable file capabilities allowed otherwise unprivileged users and processes to additionally gain these inheritable file capabilities up to the container's bounding set. Containers which use Linux users and groups to perform privilege separation inside the container are most directly impacted. This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set. This bug has been fixed in Moby (Docker Engine) 20.10.14. Running containers should be stopped, deleted, and recreated for the inheritable capabilities to be reset. This fix changes Moby (Docker Engine) behavior such that containers are started with a more typical Linux environment. As a workaround, the entry point of a container can be modified to use a utility like `capsh(1)` to drop inheritable capabilities prior to the primary process starting.


Затронутые продукты
Image SLES12-SP5-Azure-Basic-On-Demand:containerd-1.5.11-16.57.1
Image SLES12-SP5-Azure-Basic-On-Demand:docker-20.10.14_ce-98.80.1
Image SLES12-SP5-Azure-Standard-On-Demand:containerd-1.5.11-16.57.1
Image SLES12-SP5-Azure-Standard-On-Demand:docker-20.10.14_ce-98.80.1

Ссылки

Описание

The golang.org/x/crypto/ssh package before 0.0.0-20220314234659-1baeb1ce4c0b for Go allows an attacker to crash a server in certain circumstances involving AddHostKey.


Затронутые продукты
Image SLES12-SP5-Azure-Basic-On-Demand:containerd-1.5.11-16.57.1
Image SLES12-SP5-Azure-Basic-On-Demand:docker-20.10.14_ce-98.80.1
Image SLES12-SP5-Azure-Standard-On-Demand:containerd-1.5.11-16.57.1
Image SLES12-SP5-Azure-Standard-On-Demand:docker-20.10.14_ce-98.80.1

Ссылки
Уязвимость SUSE-SU-2022:1507-1