Lucene search

K
rockyRockylinux Product ErrataRLSA-2019:4269
HistoryDec 17, 2019 - 9:19 a.m.

container-tools:rhel8 security and bug fix update

2019-12-1709:19:28
Rockylinux Product Errata
errata.rockylinux.org
17

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.821 High

EPSS

Percentile

98.4%

An update is available for oci-umount, oci-systemd-hook.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

Security Fix(es):

  • HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)

  • HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)

  • runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc (CVE-2019-16884)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • avc: podman run --security-opt label=type:svirt_qemu_net_t (BZ#1764318)

  • backport json-file logging support to 1.4.2 (BZ#1770176)

  • Selinux won’t allow SCTP inter pod communication (BZ#1774382)

OSVersionArchitecturePackageVersionFilename
rocky8aarch64oci-systemd-hook< 0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2foci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.aarch64.rpm
rocky8x86_64oci-systemd-hook< 0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2foci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
rocky8aarch64oci-systemd-hook-debuginfo< 0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2foci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.aarch64.rpm
rocky8x86_64oci-systemd-hook-debuginfo< 0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2foci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
rocky8aarch64oci-systemd-hook-debugsource< 0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2foci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.aarch64.rpm
rocky8x86_64oci-systemd-hook-debugsource< 0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2foci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm
rocky8aarch64oci-umount< 2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2foci-umount-2:2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.aarch64.rpm
rocky8x86_64oci-umount< 2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2foci-umount-2:2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
rocky8aarch64oci-umount-debuginfo< 2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2foci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.aarch64.rpm
rocky8x86_64oci-umount-debuginfo< 2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2foci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm
Rows per page:
1-10 of 121

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.821 High

EPSS

Percentile

98.4%