Lucene search

K
suseSuseOPENSUSE-SU-2019:0170-1
HistoryFeb 13, 2019 - 12:00 a.m.

Security update for runc (important)

2019-02-1300:00:00
lists.opensuse.org
152

8.6 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.491 Medium

EPSS

Percentile

97.2%

An update that solves four vulnerabilities and has one
errata is now available.

Description:

This update for runc fixes the following issues:

Security vulnerabilities addressed:

  • CVE-2019-5736: Effectively copying /proc/self/exe during re-exec to
    avoid write attacks to the host runc binary, which could lead to a
    container breakout (bsc#1121967)
  • CVE-2018-16873: Fix a remote command execution during “go get -u”
    (boo#1118897)
  • CVE-2018-16874: Fix a directory traversal in “go get” via curly braces
    in import paths (boo#1118898)
  • CVE-2018-16875: Fix a CPU denial of service issue (boo#1118899)

Other changes and bug fixes:

  • Update go requirements to >= go1.10
  • Create a symlink in /usr/bin/runc to enable rootless Podman and Buildah.
  • Make use of %license macro
  • Remove ‘go test’ from %check section, as it has only ever caused us
    problems and hasn’t (as far as I remember) ever caught a
    release-blocking issue. Smoke testing has been far more useful.
    (boo#1095817)
  • Upgrade to runc v1.0.0~rc6. Upstream changelog is available from
    https://github.com/opencontainers/runc/releases/tag/v1.0.0-rc6

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Backports SLE-15:

    zypper in -t patch openSUSE-2019-170=1

OSVersionArchitecturePackageVersionFilename
openSUSE Backports SLE15aarch64<  openSUSE Backports SLE-15 (aarch64 ppc64le s390x x86_64):- openSUSE Backports SLE-15 (aarch64 ppc64le s390x x86_64):.aarch64.rpm
openSUSE Backports SLE15ppc64le<  openSUSE Backports SLE-15 (aarch64 ppc64le s390x x86_64):- openSUSE Backports SLE-15 (aarch64 ppc64le s390x x86_64):.ppc64le.rpm
openSUSE Backports SLE15s390x<  openSUSE Backports SLE-15 (aarch64 ppc64le s390x x86_64):- openSUSE Backports SLE-15 (aarch64 ppc64le s390x x86_64):.s390x.rpm
openSUSE Backports SLE15x86_64<  openSUSE Backports SLE-15 (aarch64 ppc64le s390x x86_64):- openSUSE Backports SLE-15 (aarch64 ppc64le s390x x86_64):.x86_64.rpm
openSUSE Backports SLE15noarch<  openSUSE Backports SLE-15 (noarch):- openSUSE Backports SLE-15 (noarch):.noarch.rpm

8.6 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.491 Medium

EPSS

Percentile

97.2%