drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in containerd
Name: |
Mehrere Probleme in containerd |
|
ID: |
SUSE-SU-2019:0495-1 |
|
Distribution: |
SUSE |
|
Plattformen: |
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15, SUSE Linux Enterprise Module for Containers 15 |
|
Datum: |
Di, 26. Februar 2019, 21:59 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5736
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16874
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16875 |
|
Applikationen: |
containerd |
|
Originalnachricht |
SUSE Security Update: Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork, runc ______________________________________________________________________________
Announcement ID: SUSE-SU-2019:0495-1 Rating: important References: #1048046 #1051429 #1114832 #1118897 #1118898 #1118899 #1121967 #1124308 Cross-References: CVE-2018-16873 CVE-2018-16874 CVE-2018-16875 CVE-2019-5736 Affected Products: SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SUSE Linux Enterprise Module for Containers 15 ______________________________________________________________________________
An update that solves four vulnerabilities and has four fixes is now available.
Description:
This update for containerd, docker, docker-runc, golang-github-docker-libnetwork, runc fixes the following issues:
Security issues fixed:
- CVE-2018-16875: Fixed a CPU Denial of Service (bsc#1118899). - CVE-2018-16874: Fixed a vulnerabity in go get command which could allow directory traversal in GOPATH mode (bsc#1118898). - CVE-2018-16873: Fixed a vulnerability in go get command which could allow remote code execution when executed with -u in GOPATH mode (bsc#1118897). - CVE-2019-5736: Effectively copying /proc/self/exe during re-exec to avoid write attacks to the host runc binary, which could lead to a container breakout (bsc#1121967).
Other changes and fixes:
- Update shell completion to use Group: System/Shells. - Add daemon.json file with rotation logs configuration (bsc#1114832) - Update to Docker 18.09.1-ce (bsc#1124308) and to to runc 96ec2177ae84. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. - Update go requirements to >= go1.10 - Use -buildmode=pie for tests and binary build (bsc#1048046 and bsc#1051429). - Remove the usage of 'cp -r' to reduce noise in the build logs.
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Module for Open Buildservice Development Tools 15:
zypper in -t patch SUSE-SLE-Module-Development-Tools-OBS-15-2019-495=1
- SUSE Linux Enterprise Module for Containers 15:
zypper in -t patch SUSE-SLE-Module-Containers-15-2019-495=1
Package List:
- SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (aarch64 ppc64le s390x x86_64):
containerd-ctr-1.2.2-5.9.1 docker-debuginfo-18.09.1_ce-6.14.1 docker-debugsource-18.09.1_ce-6.14.1 docker-test-18.09.1_ce-6.14.1 docker-test-debuginfo-18.09.1_ce-6.14.1 golang-github-docker-libnetwork-0.7.0.1+gitr2711_2cfbf9b1f981-4.9.1
- SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (noarch):
containerd-test-1.2.2-5.9.1 docker-runc-test-1.0.0rc6+gitr3748_96ec2177ae84-6.12.1 docker-zsh-completion-18.09.1_ce-6.14.1
- SUSE Linux Enterprise Module for Containers 15 (ppc64le s390x x86_64):
containerd-1.2.2-5.9.1 docker-18.09.1_ce-6.14.1 docker-debuginfo-18.09.1_ce-6.14.1 docker-debugsource-18.09.1_ce-6.14.1 docker-libnetwork-0.7.0.1+gitr2711_2cfbf9b1f981-4.9.1 docker-libnetwork-debuginfo-0.7.0.1+gitr2711_2cfbf9b1f981-4.9.1 docker-runc-1.0.0rc6+gitr3748_96ec2177ae84-6.12.1 docker-runc-debuginfo-1.0.0rc6+gitr3748_96ec2177ae84-6.12.1
- SUSE Linux Enterprise Module for Containers 15 (noarch):
docker-bash-completion-18.09.1_ce-6.14.1
References:
https://www.suse.com/security/cve/CVE-2018-16873.html https://www.suse.com/security/cve/CVE-2018-16874.html https://www.suse.com/security/cve/CVE-2018-16875.html https://www.suse.com/security/cve/CVE-2019-5736.html https://bugzilla.suse.com/1048046 https://bugzilla.suse.com/1051429 https://bugzilla.suse.com/1114832 https://bugzilla.suse.com/1118897 https://bugzilla.suse.com/1118898 https://bugzilla.suse.com/1118899 https://bugzilla.suse.com/1121967 https://bugzilla.suse.com/1124308
_______________________________________________ sle-security-updates mailing list sle-security-updates@lists.suse.com http://lists.suse.com/mailman/listinfo/sle-security-updates
|
|
|
|