Lucene search

K
suseSuseOPENSUSE-SU-2021:0278-1
HistoryFeb 12, 2021 - 12:00 a.m.

Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork (important)

2021-02-1200:00:00
lists.opensuse.org
28

6.8 Medium

CVSS3

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

An update that solves three vulnerabilities and has 5 fixes
is now available.

Description:

This update for containerd, docker, docker-runc,
golang-github-docker-libnetwork fixes the following issues:

Security issues fixed:

  • CVE-2020-15257: Fixed a privilege escalation in containerd (bsc#1178969).
  • CVE-2021-21284: potential privilege escalation when the root user in the
    remapped namespace has access to the host filesystem (bsc#1181732)
  • CVE-2021-21285: pulling a malformed Docker image manifest crashes the
    dockerd daemon (bsc#1181730)

Non-security issues fixed:

  • Update Docker to 19.03.15-ce. See upstream changelog in the packaged
    /usr/share/doc/packages/docker/CHANGELOG.md. This update includes fixes
    for bsc#1181732 (CVE-2021-21284) and bsc#1181730 (CVE-2021-21285).

  • Only apply the boo#1178801 libnetwork patch to handle firewalld on
    openSUSE. It appears that SLES doesn’t like the patch. (bsc#1180401)

  • Update to containerd v1.3.9, which is needed for Docker v19.03.14-ce and
    fixes CVE-2020-15257. bsc#1180243

  • Update to containerd v1.3.7, which is required for Docker 19.03.13-ce.
    bsc#1176708

  • Update to Docker 19.03.14-ce. See upstream changelog in the packaged
    /usr/share/doc/packages/docker/CHANGELOG.md. CVE-2020-15257 bsc#1180243
    https://github.com/docker/docker-ce/releases/tag/v19.03.14

  • Enable fish-completion

  • Add a patch which makes Docker compatible with firewalld with nftables
    backend. Backport of https://github.com/moby/libnetwork/pull/2548
    (bsc#1178801, SLE-16460)

  • Update to Docker 19.03.13-ce. See upstream changelog in the packaged
    /usr/share/doc/packages/docker/CHANGELOG.md. bsc#1176708

  • Fixes for %_libexecdir changing to /usr/libexec (bsc#1174075)

  • Emergency fix: %requires_eq does not work with provide symbols,
    only effective package names. Convert back to regular Requires.

  • Update to Docker 19.03.12-ce. See upstream changelog in the packaged
    /usr/share/doc/packages/docker/CHANGELOG.md.

  • Use Go 1.13 instead of Go 1.14 because Go 1.14 can cause all sorts of
    spurrious errors due to Go returning -EINTR from I/O syscalls much more
    often (due to Go 1.14’s pre-emptive goroutine support).

  • Add BuildRequires for all -git dependencies so that we catch missing
    dependencies much more quickly.

  • Update to libnetwork 55e924b8a842, which is required for Docker
    19.03.14-ce. bsc#1180243

  • Add patch which makes libnetwork compatible with firewalld with nftables
    backend. Backport of https://github.com/moby/libnetwork/pull/2548
    (bsc#1178801, SLE-16460)

This update was imported from the SUSE:SLE-15:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.2:

    zypper in -t patch openSUSE-2021-278=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap15.2x86_64< - openSUSE Leap 15.2 (x86_64):- openSUSE Leap 15.2 (x86_64):.x86_64.rpm
openSUSE Leap15.2noarch< - openSUSE Leap 15.2 (noarch):- openSUSE Leap 15.2 (noarch):.noarch.rpm

6.8 Medium

CVSS3

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P