Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2019:2021-1

Опубликовано: 29 авг. 2019
Источник: suse-cvrf

Описание

Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork

This update for containerd, docker, docker-runc, golang-github-docker-libnetwork fixes the following issues:

Docker:

  • CVE-2019-14271: Fixed a code injection if the nsswitch facility dynamically loaded a library inside a chroot (bsc#1143409).
  • CVE-2019-13509: Fixed an information leak in the debug log (bsc#1142160).
  • Update to version 19.03.1-ce, see changelog at /usr/share/doc/packages/docker/CHANGELOG.md (bsc#1142413, bsc#1139649).

runc:

  • Use %config(noreplace) for /etc/docker/daemon.json (bsc#1138920).
  • Update to runc 425e105d5a03, which is required by Docker (bsc#1139649).

containerd:

  • CVE-2019-5736: Fixed a container breakout vulnerability (bsc#1121967).
  • Update to containerd v1.2.6, which is required by docker (bsc#1139649).

golang-github-docker-libnetwork:

  • Update to version git.fc5a7d91d54cc98f64fc28f9e288b46a0bee756c, which is required by docker (bsc#1142413, bsc#1139649).

This update was imported from the SUSE:SLE-15:Update update project.

Список пакетов

openSUSE Leap 15.0
containerd-1.2.6-lp151.2.6.1
containerd-ctr-1.2.6-lp151.2.6.1
docker-19.03.1_ce-lp151.2.12.1
docker-bash-completion-19.03.1_ce-lp151.2.12.1
docker-libnetwork-0.7.0.1+gitr2800_fc5a7d91d54c-lp151.2.6.1
docker-runc-1.0.0rc8+gitr3826_425e105d5a03-lp151.3.6.1
docker-test-19.03.1_ce-lp151.2.12.1
docker-zsh-completion-19.03.1_ce-lp151.2.12.1
golang-github-docker-libnetwork-0.7.0.1+gitr2800_fc5a7d91d54c-lp151.2.6.1
openSUSE Leap 15.1
containerd-1.2.6-lp151.2.6.1
containerd-ctr-1.2.6-lp151.2.6.1
docker-19.03.1_ce-lp151.2.12.1
docker-bash-completion-19.03.1_ce-lp151.2.12.1
docker-libnetwork-0.7.0.1+gitr2800_fc5a7d91d54c-lp151.2.6.1
docker-runc-1.0.0rc8+gitr3826_425e105d5a03-lp151.3.6.1
docker-test-19.03.1_ce-lp151.2.12.1
docker-zsh-completion-19.03.1_ce-lp151.2.12.1
golang-github-docker-libnetwork-0.7.0.1+gitr2800_fc5a7d91d54c-lp151.2.6.1

Описание

The default OCI linux spec in oci/defaults{_linux}.go in Docker/Moby from 1.11 to current does not block /proc/acpi pathnames. The flaw allows an attacker to modify host's hardware like enabling/disabling bluetooth or turning up/down keyboard brightness.


Затронутые продукты
openSUSE Leap 15.0:containerd-1.2.6-lp151.2.6.1
openSUSE Leap 15.0:containerd-ctr-1.2.6-lp151.2.6.1
openSUSE Leap 15.0:docker-19.03.1_ce-lp151.2.12.1
openSUSE Leap 15.0:docker-bash-completion-19.03.1_ce-lp151.2.12.1

Ссылки

Описание

In Docker CE and EE before 18.09.8 (as well as Docker EE before 17.06.2-ee-23 and 18.x before 18.03.1-ee-10), Docker Engine in debug mode may sometimes add secrets to the debug log. This applies to a scenario where docker stack deploy is run to redeploy a stack that includes (non external) secrets. It potentially applies to other API users of the stack API if they resend the secret.


Затронутые продукты
openSUSE Leap 15.0:containerd-1.2.6-lp151.2.6.1
openSUSE Leap 15.0:containerd-ctr-1.2.6-lp151.2.6.1
openSUSE Leap 15.0:docker-19.03.1_ce-lp151.2.12.1
openSUSE Leap 15.0:docker-bash-completion-19.03.1_ce-lp151.2.12.1

Ссылки

Описание

In Docker 19.03.x before 19.03.1 linked against the GNU C Library (aka glibc), code injection can occur when the nsswitch facility dynamically loads a library inside a chroot that contains the contents of the container.


Затронутые продукты
openSUSE Leap 15.0:containerd-1.2.6-lp151.2.6.1
openSUSE Leap 15.0:containerd-ctr-1.2.6-lp151.2.6.1
openSUSE Leap 15.0:docker-19.03.1_ce-lp151.2.12.1
openSUSE Leap 15.0:docker-bash-completion-19.03.1_ce-lp151.2.12.1

Ссылки

Описание

runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.


Затронутые продукты
openSUSE Leap 15.0:containerd-1.2.6-lp151.2.6.1
openSUSE Leap 15.0:containerd-ctr-1.2.6-lp151.2.6.1
openSUSE Leap 15.0:docker-19.03.1_ce-lp151.2.12.1
openSUSE Leap 15.0:docker-bash-completion-19.03.1_ce-lp151.2.12.1

Ссылки