SUSE-SU-2021:1458-1

Source
https://www.suse.com/support/update/announcement/2021/suse-su-20211458-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:1458-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2021:1458-1
Related
Published
2021-04-30T10:58:51Z
Modified
2021-04-30T10:58:51Z
Summary
Security update for containerd, docker, runc
Details

This update for containerd, docker, runc fixes the following issues:

  • Docker was updated to 20.10.6-ce

    • Switch version to use -ce suffix rather than _ce to avoid confusing other tools (bsc#1182476).
    • CVE-2021-21284: Fixed a potential privilege escalation when the root user in the remapped namespace has access to the host filesystem (bsc#1181732)
    • CVE-2021-21285: Fixed an issue where pulling a malformed Docker image manifest crashes the dockerd daemon (bsc#1181730).
  • runc was updated to v1.0.0~rc93 (bsc#1182451 and bsc#1184962).

    • Use the upstream runc package (bsc#1181641, bsc#1181677, bsc#1175821).
    • Fixed /dev/null is not available (bsc#1168481).
    • Fixed an issue where podman hangs when spawned by salt-minion process (bsc#1149954).
    • CVE-2019-19921: Fixed a race condition with shared mounts (bsc#1160452).
    • CVE-2019-16884: Fixed an LSM bypass via malicious Docker image that mount over a /proc directory (bsc#1152308).
    • CVE-2019-5736: Fixed potential write attacks to the host runc binary (bsc#1121967).
    • Fixed an issue where after a kernel-update docker doesn't run (bsc#1131314 bsc#1131553)
    • Ensure that we always include the version information in runc (bsc#1053532).
  • Switch to Go 1.13 for build.

    • CVE-2018-16873: Fixed a potential remote code execution (bsc#1118897).
    • CVE-2018-16874: Fixed a directory traversal in 'go get' via curly braces in import paths (bsc#1118898).
    • CVE-2018-16875: Fixed a CPU denial of service (bsc#1118899).
    • Fixed an issue with building containers (bsc#1095817).
  • containerd was updated to v1.4.4

    • CVE-2021-21334: Fixed a potential information leak through environment variables (bsc#1183397).
    • Handle a requirement from docker (bsc#1181594).
    • Install the containerd-shim* binaries and stop creating (bsc#1183024).
    • update version to the one required by docker (bsc#1034053)
  • Use -buildmode=pie for tests and binary build (bsc#1048046, bsc#1051429)

  • Cleanup seccomp builds similar (bsc#1028638).
  • Update to handle the docker-runc removal, and drop the -kubic flavour (bsc#1181677, bsc#1181749)
References

Affected packages

SUSE:Linux Enterprise Module for Containers 12 / containerd

Package

Name
containerd
Purl
purl:rpm/suse/containerd&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Containers%2012

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.4-16.38.1

Ecosystem specific

{
    "binaries": [
        {
            "runc": "1.0.0~rc93-16.8.1",
            "containerd": "1.4.4-16.38.1",
            "docker": "20.10.6_ce-98.66.1"
        }
    ]
}

SUSE:Linux Enterprise Module for Containers 12 / docker

Package

Name
docker
Purl
purl:rpm/suse/docker&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Containers%2012

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
20.10.6_ce-98.66.1

Ecosystem specific

{
    "binaries": [
        {
            "runc": "1.0.0~rc93-16.8.1",
            "containerd": "1.4.4-16.38.1",
            "docker": "20.10.6_ce-98.66.1"
        }
    ]
}

SUSE:Linux Enterprise Module for Containers 12 / runc

Package

Name
runc
Purl
purl:rpm/suse/runc&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Containers%2012

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.0~rc93-16.8.1

Ecosystem specific

{
    "binaries": [
        {
            "runc": "1.0.0~rc93-16.8.1",
            "containerd": "1.4.4-16.38.1",
            "docker": "20.10.6_ce-98.66.1"
        }
    ]
}