You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa runc

Sigurnosni nedostatak programskog paketa runc

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LRH

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: runc security update
Advisory ID: RHSA-2019:0303-01
Product: Red Hat Enterprise Linux Extras
Advisory URL: https://access.redhat.com/errata/RHSA-2019:0303
Issue date: 2019-02-11
CVE Names: CVE-2019-5736
=====================================================================

1. Summary:

An update for runc is now available for Red Hat Enterprise Linux 7 Extras.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux 7 Extras – aarch64, ppc64le, s390x, x86_64

3. Description:

The runC tool is a lightweight, portable implementation of the Open
Container Format (OCF) that provides container runtime.

Security Fix(es):

* A flaw was found in the way runc handled system file descriptors when
running containers. A malicious container could use this flaw to overwrite
contents of the runc binary and consequently run arbitrary commands on the
container host system. (CVE-2019-5736)

Additional details about this flaw, including mitigation information, can
be found in the vulnerability article linked from the Reference section.

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1664908 – CVE-2019-5736 runc: Execution of malicious containers allows for container escape and access to host filesystem

6. Package List:

Red Hat Enterprise Linux 7 Extras:

Source:
runc-1.0.0-59.dev.git2abd837.el7.src.rpm

aarch64:
runc-1.0.0-59.dev.git2abd837.el7.aarch64.rpm
runc-debuginfo-1.0.0-59.dev.git2abd837.el7.aarch64.rpm

ppc64le:
runc-1.0.0-59.dev.git2abd837.el7.ppc64le.rpm
runc-debuginfo-1.0.0-59.dev.git2abd837.el7.ppc64le.rpm

s390x:
runc-1.0.0-59.dev.git2abd837.el7.s390x.rpm
runc-debuginfo-1.0.0-59.dev.git2abd837.el7.s390x.rpm

x86_64:
runc-1.0.0-59.dev.git2abd837.el7.x86_64.rpm
runc-debuginfo-1.0.0-59.dev.git2abd837.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-5736
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/security/vulnerabilities/runcescape

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=4jV6
—–END PGP SIGNATURE—–


RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

AutorJosip Papratovic
Cert idNCERT-REF-2019-02-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programske biblioteke libu2f

Otkriven je sigurnosni nedostatak programske biblioteke libu2f za operacijski sustav Ubuntu. Otkriveni nedostatak potencijalnim napadačima omogućuje izvršavanje proizvoljnog programskog koda....

Close