Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2020:0045-1

Опубликовано: 13 янв. 2020
Источник: suse-cvrf

Описание

Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork

This update for containerd, docker, docker-runc, golang-github-docker-libnetwork fixes the following issues:

Security issue fixed:

  • CVE-2019-16884: Fixed incomplete patch for LSM bypass via malicious Docker image that mount over a /proc directory (bsc#1152308).

Bug fixes:

  • Update to Docker 19.03.5-ce (bsc#1158590).
  • Update to Docker 19.03.3-ce (bsc#1153367).
  • Update to Docker 19.03.2-ce (bsc#1150397).
  • Fixed default installation such that --userns-remap=default works properly (bsc#1143349).
  • Fixed nginx blocked by apparmor (bsc#1122469).

This update was imported from the SUSE:SLE-15:Update update project.

Список пакетов

openSUSE Leap 15.1
containerd-1.2.10-lp151.2.9.1
containerd-ctr-1.2.10-lp151.2.9.1
docker-19.03.5_ce-lp151.2.15.1
docker-bash-completion-19.03.5_ce-lp151.2.15.1
docker-libnetwork-0.7.0.1+gitr2877_3eb39382bfa6-lp151.2.9.1
docker-runc-1.0.0rc8+gitr3917_3e425f80a8c9-lp151.3.12.1
docker-test-19.03.5_ce-lp151.2.15.1
docker-zsh-completion-19.03.5_ce-lp151.2.15.1
golang-github-docker-libnetwork-0.7.0.1+gitr2877_3eb39382bfa6-lp151.2.9.1

Описание

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.


Затронутые продукты
openSUSE Leap 15.1:containerd-1.2.10-lp151.2.9.1
openSUSE Leap 15.1:containerd-ctr-1.2.10-lp151.2.9.1
openSUSE Leap 15.1:docker-19.03.5_ce-lp151.2.15.1
openSUSE Leap 15.1:docker-bash-completion-19.03.5_ce-lp151.2.15.1

Ссылки
Уязвимость openSUSE-SU-2020:0045-1