Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in runc
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in runc
ID: SUSE-SU-2019:0337-1
Distribution: SUSE
Plattformen: SUSE CaaS Platform 3.0
Datum: Mi, 13. Februar 2019, 00:03
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5736
Applikationen: runc

Originalnachricht

   SUSE Security Update: Security update for runc
______________________________________________________________________________

Announcement ID: SUSE-SU-2019:0337-1
Rating: important
References: #1121967
Cross-References: CVE-2019-5736
Affected Products:
SUSE CaaS Platform 3.0
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for runc fixes the following issues:

Security issue fixed:

- CVE-2019-5736: Effectively copying /proc/self/exe during re-exec to
avoid write attacks to the host runc binary, which could lead to a
container breakout (bsc#1121967)


Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE CaaS Platform 3.0:

To install this update, use the SUSE CaaS Platform Velum dashboard.
It will inform you if it detects new updates and let you then trigger
updating of the complete cluster in a controlled way.



Package List:

- SUSE CaaS Platform 3.0 (x86_64):

runc-1.0.0~rc5-3.6.1
runc-debuginfo-1.0.0~rc5-3.6.1
runc-debugsource-1.0.0~rc5-3.6.1


References:

https://www.suse.com/security/cve/CVE-2019-5736.html
https://bugzilla.suse.com/1121967

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung