Lucene search

K
rockyRockylinux Product ErrataRLSA-2019:0975
HistoryMay 07, 2019 - 3:39 a.m.

container-tools:rhel8 security and bug fix update

2019-05-0703:39:11
Rockylinux Product Errata
errata.rockylinux.org
17

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

8.6 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

0.004 Low

EPSS

Percentile

73.6%

An update is available for oci-umount, oci-systemd-hook.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

Security Fix(es):

  • A flaw was found in the way runc handled system file descriptors when running containers. A malicious container could use this flaw to overwrite contents of the runc binary and consequently run arbitrary commands on the container host system. (CVE-2019-5736)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • [stream Rocky Linux8] rebase container-selinux to 2.94 (BZ#1693675)

  • [stream Rocky Linux8] unable to mount disk at /var/lib/containers via systemd unit when container-selinux policy installed (BZ#1695669)

  • [stream Rocky Linux8] don’t allow a container to connect to random services (BZ#1695689)

OSVersionArchitecturePackageVersionFilename
rocky8aarch64oci-systemd-hook< 0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2foci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.aarch64.rpm
rocky8x86_64oci-systemd-hook< 0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2foci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
rocky8aarch64oci-systemd-hook-debuginfo< 0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2foci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.aarch64.rpm
rocky8x86_64oci-systemd-hook-debuginfo< 0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2foci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
rocky8aarch64oci-systemd-hook-debugsource< 0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2foci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.aarch64.rpm
rocky8x86_64oci-systemd-hook-debugsource< 0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2foci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
rocky8aarch64oci-umount< 2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2foci-umount-2:2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.aarch64.rpm
rocky8x86_64oci-umount< 2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2foci-umount-2:2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
rocky8aarch64oci-umount-debuginfo< 2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2foci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.aarch64.rpm
rocky8x86_64oci-umount-debuginfo< 2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2foci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
Rows per page:
1-10 of 121

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

8.6 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

0.004 Low

EPSS

Percentile

73.6%