Описание
Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork
This update for containerd, docker, docker-runc, golang-github-docker-libnetwork fixes the following issues:
Security issue fixed:
- CVE-2019-16884: Fixed incomplete patch for LSM bypass via malicious Docker image that mount over a /proc directory (bsc#1152308).
Bug fixes:
- Update to Docker 19.03.5-ce (bsc#1158590).
- Update to Docker 19.03.3-ce (bsc#1153367).
- Update to Docker 19.03.2-ce (bsc#1150397).
- Fixed default installation such that --userns-remap=default works properly (bsc#1143349).
- Fixed nginx blocked by apparmor (bsc#1122469).
This update was imported from the SUSE:SLE-15:Update update project.
Список пакетов
openSUSE Leap 15.1
containerd-1.2.10-lp151.2.9.1
containerd-ctr-1.2.10-lp151.2.9.1
docker-19.03.5_ce-lp151.2.15.1
docker-bash-completion-19.03.5_ce-lp151.2.15.1
docker-libnetwork-0.7.0.1+gitr2877_3eb39382bfa6-lp151.2.9.1
docker-runc-1.0.0rc8+gitr3917_3e425f80a8c9-lp151.3.12.1
docker-test-19.03.5_ce-lp151.2.15.1
docker-zsh-completion-19.03.5_ce-lp151.2.15.1
golang-github-docker-libnetwork-0.7.0.1+gitr2877_3eb39382bfa6-lp151.2.9.1
Ссылки
- E-Mail link for openSUSE-SU-2020:0045-1
- SUSE Security Ratings
- SUSE Bug 1122469
- SUSE Bug 1143349
- SUSE Bug 1150397
- SUSE Bug 1152308
- SUSE Bug 1153367
- SUSE Bug 1158590
- SUSE CVE CVE-2019-16884 page
Описание
runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.
Затронутые продукты
openSUSE Leap 15.1:containerd-1.2.10-lp151.2.9.1
openSUSE Leap 15.1:containerd-ctr-1.2.10-lp151.2.9.1
openSUSE Leap 15.1:docker-19.03.5_ce-lp151.2.15.1
openSUSE Leap 15.1:docker-bash-completion-19.03.5_ce-lp151.2.15.1
Ссылки
- CVE-2019-16884
- SUSE Bug 1152308