Anfälligkeitssuche        Suche in 172616 CVE Beschreibungen
und 81291 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.852536
Kategorie:SuSE Local Security Checks
Titel:openSUSE: Security Advisory for containerd, docker, docker-runc, go, go1.11, go1.12, golang-github-docker-libnetwork (openSUSE-SU-2019:1499-1)
Zusammenfassung:The remote host is missing an update for the 'containerd, docker, docker-runc,; go, go1.11, go1.12, golang-github-docker-libnetwork' package(s) announced via the openSUSE-SU-2019:1499-1 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'containerd, docker, docker-runc,
go, go1.11, go1.12, golang-github-docker-libnetwork' package(s) announced via the openSUSE-SU-2019:1499-1 advisory.

Vulnerability Insight:
This update for containerd, docker, docker-runc, go, go1.11, go1.12,
golang-github-docker-libnetwork fixes the following issues:

Security issues fixed:

- CVE-2019-5736: containerd: Fixing container breakout vulnerability
(bsc#1121967).

- CVE-2019-6486: go security release, fixing crypto/elliptic CPU DoS
vulnerability affecting P-521 and P-384 (bsc#1123013).

- CVE-2018-16873: go secuirty release, fixing cmd/go remote command
execution (bsc#1118897).

- CVE-2018-16874: go security release, fixing cmd/go directory traversal
(bsc#1118898).

- CVE-2018-16875: go security release, fixing crypto/x509 CPU denial of
service (bsc#1118899).

Other changes and bug fixes:

- Update to containerd v1.2.5, which is required for v18.09.5-ce
(bsc#1128376, bsc#1134068).

- Update to runc 2b18fe1d885e, which is required for Docker v18.09.5-ce
(bsc#1128376, bsc#1134068).

- Update to Docker 18.09.5-ce see upstream changelog in the packaged
(bsc#1128376, bsc#1134068).

- docker-test: Improvements to test packaging (bsc#1128746).

- Move daemon.json file to /etc/docker directory (bsc#1114832).

- Revert golang(API) removal since it turns out this breaks >= requires in
certain cases (bsc#1114209).

- Fix go build failures (bsc#1121397).

This update was imported from the SUSE:SLE-15:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended
installation methods
like YaST online_update or 'zypper patch'.

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-1499=1

Affected Software/OS:
'containerd, ' package(s) on openSUSE Leap 15.0.

Solution:
Please install the updated package(s).

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2019-5736
BugTraq ID: 106976
http://www.securityfocus.com/bid/106976
Cisco Security Advisory: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190215-runc
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190215-runc
https://www.exploit-db.com/exploits/46359/
https://www.exploit-db.com/exploits/46369/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EGZKRCKI3Y7FMADO2MENMT4TU24QGHFR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SWFJGIPYAAAMVSWWI3QWYXGA3ZBU2H4W/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6A4OSFM5GGOWW4ECELV5OHX2XRAUSPH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DLC52IOJN6IQJWJ6CUI6AIUP6GVVG2QP/
https://security.gentoo.org/glsa/202003-21
https://access.redhat.com/security/cve/cve-2019-5736
https://access.redhat.com/security/vulnerabilities/runcescape
https://aws.amazon.com/security/security-bulletins/AWS-2019-002/
https://azure.microsoft.com/en-us/updates/cve-2019-5736-and-runc-vulnerability/
https://azure.microsoft.com/en-us/updates/iot-edge-fix-cve-2019-5736/
https://blog.dragonsector.pl/2019/02/cve-2019-5736-escape-from-docker-and.html
https://brauner.github.io/2019/02/12/privileged-containers.html
https://bugzilla.suse.com/show_bug.cgi?id=1121967
https://cloud.google.com/kubernetes-engine/docs/security-bulletins#february-11-2019-runc
https://github.com/Frichetten/CVE-2019-5736-PoC
https://github.com/docker/docker-ce/releases/tag/v18.09.2
https://github.com/opencontainers/runc/commit/0a8e4117e7f715d5fbeef398405813ce8e88558b
https://github.com/opencontainers/runc/commit/6635b4f0c6af3810594d2770f662f34ddc15b40d
https://github.com/q3k/cve-2019-5736-poc
https://github.com/rancher/runc-cve
https://kubernetes.io/blog/2019/02/11/runc-and-cve-2019-5736/
https://www.openwall.com/lists/oss-security/2019/02/11/2
https://www.twistlock.com/2019/02/11/how-to-mitigate-cve-2019-5736-in-runc-and-docker/
https://lists.apache.org/thread.html/acacf018c12636e41667e94ac0a1e9244e887eef2debdd474640aa6e@%3Cdev.dlab.apache.org%3E
https://lists.apache.org/thread.html/a585f64d14c31ab393b90c5f17e41d9765a1a17eec63856ce750af46@%3Cdev.dlab.apache.org%3E
https://lists.apache.org/thread.html/24e54e3c6b2259e3903b6b8fe26896ac649c481ea99c5739468c92a3@%3Cdev.dlab.apache.org%3E
https://lists.apache.org/thread.html/b162dd624dc088cd634292f0402282a1d1d0ce853baeae8205bc033c@%3Cdev.mesos.apache.org%3E
https://lists.apache.org/thread.html/a258757af84c5074dc7bf932622020fd4f60cef65a84290380386706@%3Cuser.mesos.apache.org%3E
http://www.openwall.com/lists/oss-security/2019/03/23/1
http://www.openwall.com/lists/oss-security/2019/06/28/2
http://www.openwall.com/lists/oss-security/2019/07/06/3
http://www.openwall.com/lists/oss-security/2019/07/06/4
http://www.openwall.com/lists/oss-security/2019/10/24/1
http://www.openwall.com/lists/oss-security/2019/10/29/3
RedHat Security Advisories: RHSA-2019:0303
https://access.redhat.com/errata/RHSA-2019:0303
RedHat Security Advisories: RHSA-2019:0304
https://access.redhat.com/errata/RHSA-2019:0304
RedHat Security Advisories: RHSA-2019:0401
https://access.redhat.com/errata/RHSA-2019:0401
RedHat Security Advisories: RHSA-2019:0408
https://access.redhat.com/errata/RHSA-2019:0408
RedHat Security Advisories: RHSA-2019:0975
https://access.redhat.com/errata/RHSA-2019:0975
SuSE Security Announcement: openSUSE-SU-2019:1079 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00044.html
SuSE Security Announcement: openSUSE-SU-2019:1227 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00074.html
SuSE Security Announcement: openSUSE-SU-2019:1275 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00091.html
SuSE Security Announcement: openSUSE-SU-2019:1444 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00060.html
SuSE Security Announcement: openSUSE-SU-2019:1481 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html
SuSE Security Announcement: openSUSE-SU-2019:1499 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00011.html
SuSE Security Announcement: openSUSE-SU-2019:1506 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00015.html
SuSE Security Announcement: openSUSE-SU-2019:2021 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html
SuSE Security Announcement: openSUSE-SU-2019:2245 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00007.html
SuSE Security Announcement: openSUSE-SU-2019:2286 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00029.html
https://usn.ubuntu.com/4048-1/
Common Vulnerability Exposure (CVE) ID: CVE-2019-6486
BugTraq ID: 106740
http://www.securityfocus.com/bid/106740
Debian Security Information: DSA-4379 (Google Search)
https://www.debian.org/security/2019/dsa-4379
Debian Security Information: DSA-4380 (Google Search)
https://www.debian.org/security/2019/dsa-4380
https://github.com/google/wycheproof
https://lists.debian.org/debian-lts-announce/2019/02/msg00009.html
SuSE Security Announcement: openSUSE-SU-2019:1164 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00042.html
CopyrightCopyright (C) 2019 Greenbone Networks GmbH

Dies ist nur einer von 81291 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2020 E-Soft Inc. Alle Rechte vorbehalten.