Vulnerability from csaf_suse
Published
2020-12-28 13:28
Modified
2020-12-28 13:28
Summary
Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork
Notes
Title of the patch
Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork
Description of the patch
This update for containerd, docker, docker-runc, golang-github-docker-libnetwork fixes the following issues:
Security issues fixed:
- CVE-2020-15257: Fixed a privilege escalation in containerd (bsc#1178969).
Non-security issues fixed:
- Update to containerd v1.3.9, which is needed for Docker v19.03.14-ce and
fixes CVE-2020-15257. bsc#1180243
- Update to containerd v1.3.7, which is required for Docker 19.03.13-ce.
bsc#1176708
- Update to Docker 19.03.14-ce. See upstream changelog in the packaged
/usr/share/doc/packages/docker/CHANGELOG.md. CVE-2020-15257 bsc#1180243
https://github.com/docker/docker-ce/releases/tag/v19.03.14
- Enable fish-completion
- Add a patch which makes Docker compatible with firewalld with
nftables backend. Backport of https://github.com/moby/libnetwork/pull/2548
(bsc#1178801, SLE-16460)
- Update to Docker 19.03.13-ce. See upstream changelog in the packaged
/usr/share/doc/packages/docker/CHANGELOG.md. bsc#1176708
- Fixes for %_libexecdir changing to /usr/libexec (bsc#1174075)
- Emergency fix: %requires_eq does not work with provide symbols,
only effective package names. Convert back to regular Requires.
- Update to Docker 19.03.12-ce. See upstream changelog in the packaged
/usr/share/doc/packages/docker/CHANGELOG.md.
- Use Go 1.13 instead of Go 1.14 because Go 1.14 can cause all sorts of
spurrious errors due to Go returning -EINTR from I/O syscalls much more often
(due to Go 1.14's pre-emptive goroutine support).
- Add BuildRequires for all -git dependencies so that we catch missing
dependencies much more quickly.
- Update to libnetwork 55e924b8a842, which is required for Docker 19.03.14-ce.
bsc#1180243
- Add patch which makes libnetwork compatible with firewalld with
nftables backend. Backport of https://github.com/moby/libnetwork/pull/2548
(bsc#1178801, SLE-16460)
Patchnames
SUSE-2020-3938,SUSE-SLE-Module-Containers-12-2020-3938
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork", title: "Title of the patch", }, { category: "description", text: "This update for containerd, docker, docker-runc, golang-github-docker-libnetwork fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2020-15257: Fixed a privilege escalation in containerd (bsc#1178969).\n\nNon-security issues fixed:\n\n- Update to containerd v1.3.9, which is needed for Docker v19.03.14-ce and\n fixes CVE-2020-15257. bsc#1180243\n\n- Update to containerd v1.3.7, which is required for Docker 19.03.13-ce.\n bsc#1176708\n\n- Update to Docker 19.03.14-ce. See upstream changelog in the packaged\n /usr/share/doc/packages/docker/CHANGELOG.md. CVE-2020-15257 bsc#1180243\n https://github.com/docker/docker-ce/releases/tag/v19.03.14\n\n- Enable fish-completion\n\n- Add a patch which makes Docker compatible with firewalld with\n nftables backend. Backport of https://github.com/moby/libnetwork/pull/2548\n (bsc#1178801, SLE-16460)\n\n- Update to Docker 19.03.13-ce. See upstream changelog in the packaged\n /usr/share/doc/packages/docker/CHANGELOG.md. bsc#1176708\n\n- Fixes for %_libexecdir changing to /usr/libexec (bsc#1174075)\n\n- Emergency fix: %requires_eq does not work with provide symbols,\n only effective package names. Convert back to regular Requires.\n\n- Update to Docker 19.03.12-ce. See upstream changelog in the packaged\n /usr/share/doc/packages/docker/CHANGELOG.md.\n- Use Go 1.13 instead of Go 1.14 because Go 1.14 can cause all sorts of\n spurrious errors due to Go returning -EINTR from I/O syscalls much more often\n (due to Go 1.14's pre-emptive goroutine support).\n- Add BuildRequires for all -git dependencies so that we catch missing\n dependencies much more quickly.\n\n- Update to libnetwork 55e924b8a842, which is required for Docker 19.03.14-ce.\n bsc#1180243\n\n- Add patch which makes libnetwork compatible with firewalld with\n nftables backend. Backport of https://github.com/moby/libnetwork/pull/2548\n (bsc#1178801, SLE-16460)\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2020-3938,SUSE-SLE-Module-Containers-12-2020-3938", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3938-1.json", }, { category: "self", summary: "URL for SUSE-SU-2020:3938-1", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20203938-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2020:3938-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2020-December/008125.html", }, { category: "self", summary: "SUSE Bug 1174075", url: "https://bugzilla.suse.com/1174075", }, { category: "self", summary: "SUSE Bug 1176708", url: "https://bugzilla.suse.com/1176708", }, { category: "self", summary: "SUSE Bug 1178801", url: "https://bugzilla.suse.com/1178801", }, { category: "self", summary: "SUSE Bug 1178969", url: "https://bugzilla.suse.com/1178969", }, { category: "self", summary: "SUSE Bug 1180243", url: "https://bugzilla.suse.com/1180243", }, { category: "self", summary: "SUSE CVE CVE-2020-15257 page", url: "https://www.suse.com/security/cve/CVE-2020-15257/", }, ], title: "Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork", tracking: { current_release_date: "2020-12-28T13:28:52Z", generator: { date: "2020-12-28T13:28:52Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2020:3938-1", initial_release_date: "2020-12-28T13:28:52Z", revision_history: [ { date: "2020-12-28T13:28:52Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "containerd-1.3.9-16.32.1.aarch64", product: { name: "containerd-1.3.9-16.32.1.aarch64", product_id: "containerd-1.3.9-16.32.1.aarch64", }, }, { category: "product_version", name: "containerd-ctr-1.3.9-16.32.1.aarch64", product: { name: "containerd-ctr-1.3.9-16.32.1.aarch64", product_id: "containerd-ctr-1.3.9-16.32.1.aarch64", }, }, { category: "product_version", name: "containerd-kubic-1.3.9-16.32.1.aarch64", product: { name: "containerd-kubic-1.3.9-16.32.1.aarch64", product_id: "containerd-kubic-1.3.9-16.32.1.aarch64", }, }, { category: "product_version", name: "containerd-kubic-ctr-1.3.9-16.32.1.aarch64", product: { name: "containerd-kubic-ctr-1.3.9-16.32.1.aarch64", product_id: "containerd-kubic-ctr-1.3.9-16.32.1.aarch64", }, }, { category: "product_version", name: "docker-19.03.14_ce-98.57.1.aarch64", product: { name: "docker-19.03.14_ce-98.57.1.aarch64", product_id: "docker-19.03.14_ce-98.57.1.aarch64", }, }, { category: "product_version", name: "docker-kubic-19.03.14_ce-98.57.1.aarch64", product: { name: "docker-kubic-19.03.14_ce-98.57.1.aarch64", product_id: "docker-kubic-19.03.14_ce-98.57.1.aarch64", }, }, { category: "product_version", name: "docker-kubic-kubeadm-criconfig-19.03.14_ce-98.57.1.aarch64", product: { name: "docker-kubic-kubeadm-criconfig-19.03.14_ce-98.57.1.aarch64", product_id: "docker-kubic-kubeadm-criconfig-19.03.14_ce-98.57.1.aarch64", }, }, { category: "product_version", name: "docker-kubic-test-19.03.14_ce-98.57.1.aarch64", product: { name: "docker-kubic-test-19.03.14_ce-98.57.1.aarch64", product_id: "docker-kubic-test-19.03.14_ce-98.57.1.aarch64", }, }, { category: "product_version", name: "docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.aarch64", product: { name: "docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.aarch64", product_id: "docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.aarch64", }, }, { category: "product_version", name: "docker-libnetwork-kubic-0.7.0.1+gitr2908_55e924b8a842-34.1.aarch64", product: { name: "docker-libnetwork-kubic-0.7.0.1+gitr2908_55e924b8a842-34.1.aarch64", product_id: "docker-libnetwork-kubic-0.7.0.1+gitr2908_55e924b8a842-34.1.aarch64", }, }, { category: "product_version", name: "docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.aarch64", product: { name: "docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.aarch64", product_id: "docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.aarch64", }, }, { category: "product_version", name: "docker-runc-kubic-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.aarch64", product: { name: "docker-runc-kubic-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.aarch64", product_id: "docker-runc-kubic-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.aarch64", }, }, { category: "product_version", name: "docker-test-19.03.14_ce-98.57.1.aarch64", product: { name: "docker-test-19.03.14_ce-98.57.1.aarch64", product_id: "docker-test-19.03.14_ce-98.57.1.aarch64", }, }, { category: "product_version", name: "fish-2.7.1-1.3.1.aarch64", product: { name: "fish-2.7.1-1.3.1.aarch64", product_id: "fish-2.7.1-1.3.1.aarch64", }, }, { category: "product_version", name: "fish-devel-2.7.1-1.3.1.aarch64", product: { name: "fish-devel-2.7.1-1.3.1.aarch64", product_id: "fish-devel-2.7.1-1.3.1.aarch64", }, }, { category: "product_version", name: "golang-github-docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.aarch64", product: { name: "golang-github-docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.aarch64", product_id: "golang-github-docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.aarch64", }, }, { category: "product_version", name: "golang-github-docker-libnetwork-kubic-0.7.0.1+gitr2908_55e924b8a842-34.1.aarch64", product: { name: "golang-github-docker-libnetwork-kubic-0.7.0.1+gitr2908_55e924b8a842-34.1.aarch64", product_id: "golang-github-docker-libnetwork-kubic-0.7.0.1+gitr2908_55e924b8a842-34.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "containerd-1.3.9-16.32.1.i586", product: { name: "containerd-1.3.9-16.32.1.i586", product_id: "containerd-1.3.9-16.32.1.i586", }, }, { category: "product_version", name: "containerd-ctr-1.3.9-16.32.1.i586", product: { name: "containerd-ctr-1.3.9-16.32.1.i586", product_id: "containerd-ctr-1.3.9-16.32.1.i586", }, }, { category: "product_version", name: "containerd-kubic-1.3.9-16.32.1.i586", product: { name: "containerd-kubic-1.3.9-16.32.1.i586", product_id: "containerd-kubic-1.3.9-16.32.1.i586", }, }, { category: "product_version", name: "containerd-kubic-ctr-1.3.9-16.32.1.i586", product: { name: "containerd-kubic-ctr-1.3.9-16.32.1.i586", product_id: "containerd-kubic-ctr-1.3.9-16.32.1.i586", }, }, { category: "product_version", name: "docker-19.03.14_ce-98.57.1.i586", product: { name: "docker-19.03.14_ce-98.57.1.i586", product_id: "docker-19.03.14_ce-98.57.1.i586", }, }, { category: "product_version", name: "docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.i586", product: { name: "docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.i586", product_id: "docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.i586", }, }, { category: "product_version", name: "docker-libnetwork-kubic-0.7.0.1+gitr2908_55e924b8a842-34.1.i586", product: { name: "docker-libnetwork-kubic-0.7.0.1+gitr2908_55e924b8a842-34.1.i586", product_id: "docker-libnetwork-kubic-0.7.0.1+gitr2908_55e924b8a842-34.1.i586", }, }, { category: "product_version", name: "docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.i586", product: { name: "docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.i586", product_id: "docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.i586", }, }, { category: "product_version", name: "docker-runc-kubic-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.i586", product: { name: "docker-runc-kubic-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.i586", product_id: "docker-runc-kubic-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.i586", }, }, { category: "product_version", name: "docker-test-19.03.14_ce-98.57.1.i586", product: { name: "docker-test-19.03.14_ce-98.57.1.i586", product_id: "docker-test-19.03.14_ce-98.57.1.i586", }, }, { category: "product_version", name: "fish-2.7.1-1.3.1.i586", product: { name: "fish-2.7.1-1.3.1.i586", product_id: "fish-2.7.1-1.3.1.i586", }, }, { category: "product_version", name: "fish-devel-2.7.1-1.3.1.i586", product: { name: "fish-devel-2.7.1-1.3.1.i586", product_id: "fish-devel-2.7.1-1.3.1.i586", }, }, { category: "product_version", name: "golang-github-docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.i586", product: { name: "golang-github-docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.i586", product_id: "golang-github-docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.i586", }, }, { category: "product_version", name: "golang-github-docker-libnetwork-kubic-0.7.0.1+gitr2908_55e924b8a842-34.1.i586", product: { name: "golang-github-docker-libnetwork-kubic-0.7.0.1+gitr2908_55e924b8a842-34.1.i586", product_id: "golang-github-docker-libnetwork-kubic-0.7.0.1+gitr2908_55e924b8a842-34.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "docker-bash-completion-19.03.14_ce-98.57.1.noarch", product: { name: "docker-bash-completion-19.03.14_ce-98.57.1.noarch", product_id: "docker-bash-completion-19.03.14_ce-98.57.1.noarch", }, }, { category: "product_version", name: "docker-fish-completion-19.03.14_ce-98.57.1.noarch", product: { name: "docker-fish-completion-19.03.14_ce-98.57.1.noarch", product_id: "docker-fish-completion-19.03.14_ce-98.57.1.noarch", }, }, { category: "product_version", name: "docker-kubic-bash-completion-19.03.14_ce-98.57.1.noarch", product: { name: "docker-kubic-bash-completion-19.03.14_ce-98.57.1.noarch", product_id: "docker-kubic-bash-completion-19.03.14_ce-98.57.1.noarch", }, }, { category: "product_version", name: "docker-kubic-fish-completion-19.03.14_ce-98.57.1.noarch", product: { name: "docker-kubic-fish-completion-19.03.14_ce-98.57.1.noarch", product_id: "docker-kubic-fish-completion-19.03.14_ce-98.57.1.noarch", }, }, { category: "product_version", name: "docker-kubic-zsh-completion-19.03.14_ce-98.57.1.noarch", product: { name: "docker-kubic-zsh-completion-19.03.14_ce-98.57.1.noarch", product_id: "docker-kubic-zsh-completion-19.03.14_ce-98.57.1.noarch", }, }, { category: "product_version", name: "docker-zsh-completion-19.03.14_ce-98.57.1.noarch", product: { name: "docker-zsh-completion-19.03.14_ce-98.57.1.noarch", product_id: "docker-zsh-completion-19.03.14_ce-98.57.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "containerd-1.3.9-16.32.1.ppc64le", product: { name: "containerd-1.3.9-16.32.1.ppc64le", product_id: "containerd-1.3.9-16.32.1.ppc64le", }, }, { category: "product_version", name: "containerd-ctr-1.3.9-16.32.1.ppc64le", product: { name: "containerd-ctr-1.3.9-16.32.1.ppc64le", product_id: "containerd-ctr-1.3.9-16.32.1.ppc64le", }, }, { category: "product_version", name: "containerd-kubic-1.3.9-16.32.1.ppc64le", product: { name: "containerd-kubic-1.3.9-16.32.1.ppc64le", product_id: "containerd-kubic-1.3.9-16.32.1.ppc64le", }, }, { category: "product_version", name: "containerd-kubic-ctr-1.3.9-16.32.1.ppc64le", product: { name: "containerd-kubic-ctr-1.3.9-16.32.1.ppc64le", product_id: "containerd-kubic-ctr-1.3.9-16.32.1.ppc64le", }, }, { category: "product_version", name: "docker-19.03.14_ce-98.57.1.ppc64le", product: { name: "docker-19.03.14_ce-98.57.1.ppc64le", product_id: "docker-19.03.14_ce-98.57.1.ppc64le", }, }, { category: "product_version", name: "docker-kubic-19.03.14_ce-98.57.1.ppc64le", product: { name: "docker-kubic-19.03.14_ce-98.57.1.ppc64le", product_id: "docker-kubic-19.03.14_ce-98.57.1.ppc64le", }, }, { category: "product_version", name: "docker-kubic-kubeadm-criconfig-19.03.14_ce-98.57.1.ppc64le", product: { name: "docker-kubic-kubeadm-criconfig-19.03.14_ce-98.57.1.ppc64le", product_id: "docker-kubic-kubeadm-criconfig-19.03.14_ce-98.57.1.ppc64le", }, }, { category: "product_version", name: "docker-kubic-test-19.03.14_ce-98.57.1.ppc64le", product: { name: "docker-kubic-test-19.03.14_ce-98.57.1.ppc64le", product_id: "docker-kubic-test-19.03.14_ce-98.57.1.ppc64le", }, }, { category: "product_version", name: "docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.ppc64le", product: { name: "docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.ppc64le", product_id: "docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.ppc64le", }, }, { category: "product_version", name: "docker-libnetwork-kubic-0.7.0.1+gitr2908_55e924b8a842-34.1.ppc64le", product: { name: "docker-libnetwork-kubic-0.7.0.1+gitr2908_55e924b8a842-34.1.ppc64le", product_id: "docker-libnetwork-kubic-0.7.0.1+gitr2908_55e924b8a842-34.1.ppc64le", }, }, { category: "product_version", name: "docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.ppc64le", product: { name: "docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.ppc64le", product_id: "docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.ppc64le", }, }, { category: "product_version", name: "docker-runc-kubic-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.ppc64le", product: { name: "docker-runc-kubic-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.ppc64le", product_id: "docker-runc-kubic-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.ppc64le", }, }, { category: "product_version", name: "docker-test-19.03.14_ce-98.57.1.ppc64le", product: { name: "docker-test-19.03.14_ce-98.57.1.ppc64le", product_id: "docker-test-19.03.14_ce-98.57.1.ppc64le", }, }, { category: "product_version", name: "fish-2.7.1-1.3.1.ppc64le", product: { name: "fish-2.7.1-1.3.1.ppc64le", product_id: "fish-2.7.1-1.3.1.ppc64le", }, }, { category: "product_version", name: "fish-devel-2.7.1-1.3.1.ppc64le", product: { name: "fish-devel-2.7.1-1.3.1.ppc64le", product_id: "fish-devel-2.7.1-1.3.1.ppc64le", }, }, { category: "product_version", name: "golang-github-docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.ppc64le", product: { name: "golang-github-docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.ppc64le", product_id: "golang-github-docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.ppc64le", }, }, { category: "product_version", name: "golang-github-docker-libnetwork-kubic-0.7.0.1+gitr2908_55e924b8a842-34.1.ppc64le", product: { name: "golang-github-docker-libnetwork-kubic-0.7.0.1+gitr2908_55e924b8a842-34.1.ppc64le", product_id: "golang-github-docker-libnetwork-kubic-0.7.0.1+gitr2908_55e924b8a842-34.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "fish-2.7.1-1.3.1.s390", product: { name: "fish-2.7.1-1.3.1.s390", product_id: "fish-2.7.1-1.3.1.s390", }, }, { category: "product_version", name: "fish-devel-2.7.1-1.3.1.s390", product: { name: "fish-devel-2.7.1-1.3.1.s390", product_id: "fish-devel-2.7.1-1.3.1.s390", }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "containerd-1.3.9-16.32.1.s390x", product: { name: "containerd-1.3.9-16.32.1.s390x", product_id: "containerd-1.3.9-16.32.1.s390x", }, }, { category: "product_version", name: "containerd-ctr-1.3.9-16.32.1.s390x", product: { name: "containerd-ctr-1.3.9-16.32.1.s390x", product_id: "containerd-ctr-1.3.9-16.32.1.s390x", }, }, { category: "product_version", name: "containerd-kubic-1.3.9-16.32.1.s390x", product: { name: "containerd-kubic-1.3.9-16.32.1.s390x", product_id: "containerd-kubic-1.3.9-16.32.1.s390x", }, }, { category: "product_version", name: "containerd-kubic-ctr-1.3.9-16.32.1.s390x", product: { name: "containerd-kubic-ctr-1.3.9-16.32.1.s390x", product_id: "containerd-kubic-ctr-1.3.9-16.32.1.s390x", }, }, { category: "product_version", name: "docker-19.03.14_ce-98.57.1.s390x", product: { name: "docker-19.03.14_ce-98.57.1.s390x", product_id: "docker-19.03.14_ce-98.57.1.s390x", }, }, { category: "product_version", name: "docker-kubic-19.03.14_ce-98.57.1.s390x", product: { name: "docker-kubic-19.03.14_ce-98.57.1.s390x", product_id: "docker-kubic-19.03.14_ce-98.57.1.s390x", }, }, { category: "product_version", name: "docker-kubic-kubeadm-criconfig-19.03.14_ce-98.57.1.s390x", product: { name: "docker-kubic-kubeadm-criconfig-19.03.14_ce-98.57.1.s390x", product_id: "docker-kubic-kubeadm-criconfig-19.03.14_ce-98.57.1.s390x", }, }, { category: "product_version", name: "docker-kubic-test-19.03.14_ce-98.57.1.s390x", product: { name: "docker-kubic-test-19.03.14_ce-98.57.1.s390x", product_id: "docker-kubic-test-19.03.14_ce-98.57.1.s390x", }, }, { category: "product_version", name: "docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.s390x", product: { name: "docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.s390x", product_id: "docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.s390x", }, }, { category: "product_version", name: "docker-libnetwork-kubic-0.7.0.1+gitr2908_55e924b8a842-34.1.s390x", product: { name: "docker-libnetwork-kubic-0.7.0.1+gitr2908_55e924b8a842-34.1.s390x", product_id: "docker-libnetwork-kubic-0.7.0.1+gitr2908_55e924b8a842-34.1.s390x", }, }, { category: "product_version", name: "docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.s390x", product: { name: "docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.s390x", product_id: "docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.s390x", }, }, { category: "product_version", name: "docker-runc-kubic-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.s390x", product: { name: "docker-runc-kubic-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.s390x", product_id: "docker-runc-kubic-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.s390x", }, }, { category: "product_version", name: "docker-test-19.03.14_ce-98.57.1.s390x", product: { name: "docker-test-19.03.14_ce-98.57.1.s390x", product_id: "docker-test-19.03.14_ce-98.57.1.s390x", }, }, { category: "product_version", name: "fish-2.7.1-1.3.1.s390x", product: { name: "fish-2.7.1-1.3.1.s390x", product_id: "fish-2.7.1-1.3.1.s390x", }, }, { category: "product_version", name: "fish-devel-2.7.1-1.3.1.s390x", product: { name: "fish-devel-2.7.1-1.3.1.s390x", product_id: "fish-devel-2.7.1-1.3.1.s390x", }, }, { category: "product_version", name: "golang-github-docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.s390x", product: { name: "golang-github-docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.s390x", product_id: "golang-github-docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.s390x", }, }, { category: "product_version", name: "golang-github-docker-libnetwork-kubic-0.7.0.1+gitr2908_55e924b8a842-34.1.s390x", product: { name: "golang-github-docker-libnetwork-kubic-0.7.0.1+gitr2908_55e924b8a842-34.1.s390x", product_id: "golang-github-docker-libnetwork-kubic-0.7.0.1+gitr2908_55e924b8a842-34.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "containerd-1.3.9-16.32.1.x86_64", product: { name: "containerd-1.3.9-16.32.1.x86_64", product_id: "containerd-1.3.9-16.32.1.x86_64", }, }, { category: "product_version", name: "containerd-ctr-1.3.9-16.32.1.x86_64", product: { name: "containerd-ctr-1.3.9-16.32.1.x86_64", product_id: "containerd-ctr-1.3.9-16.32.1.x86_64", }, }, { category: "product_version", name: "containerd-kubic-1.3.9-16.32.1.x86_64", product: { name: "containerd-kubic-1.3.9-16.32.1.x86_64", product_id: "containerd-kubic-1.3.9-16.32.1.x86_64", }, }, { category: "product_version", name: "containerd-kubic-ctr-1.3.9-16.32.1.x86_64", product: { name: "containerd-kubic-ctr-1.3.9-16.32.1.x86_64", product_id: "containerd-kubic-ctr-1.3.9-16.32.1.x86_64", }, }, { category: "product_version", name: "docker-19.03.14_ce-98.57.1.x86_64", product: { name: "docker-19.03.14_ce-98.57.1.x86_64", product_id: "docker-19.03.14_ce-98.57.1.x86_64", }, }, { category: "product_version", name: "docker-kubic-19.03.14_ce-98.57.1.x86_64", product: { name: "docker-kubic-19.03.14_ce-98.57.1.x86_64", product_id: "docker-kubic-19.03.14_ce-98.57.1.x86_64", }, }, { category: "product_version", name: "docker-kubic-kubeadm-criconfig-19.03.14_ce-98.57.1.x86_64", product: { name: "docker-kubic-kubeadm-criconfig-19.03.14_ce-98.57.1.x86_64", product_id: "docker-kubic-kubeadm-criconfig-19.03.14_ce-98.57.1.x86_64", }, }, { category: "product_version", name: "docker-kubic-test-19.03.14_ce-98.57.1.x86_64", product: { name: "docker-kubic-test-19.03.14_ce-98.57.1.x86_64", product_id: "docker-kubic-test-19.03.14_ce-98.57.1.x86_64", }, }, { category: "product_version", name: "docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.x86_64", product: { name: "docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.x86_64", product_id: "docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.x86_64", }, }, { category: "product_version", name: "docker-libnetwork-kubic-0.7.0.1+gitr2908_55e924b8a842-34.1.x86_64", product: { name: "docker-libnetwork-kubic-0.7.0.1+gitr2908_55e924b8a842-34.1.x86_64", product_id: "docker-libnetwork-kubic-0.7.0.1+gitr2908_55e924b8a842-34.1.x86_64", }, }, { category: "product_version", name: "docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.x86_64", product: { name: "docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.x86_64", product_id: "docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.x86_64", }, }, { category: "product_version", name: "docker-runc-kubic-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.x86_64", product: { name: "docker-runc-kubic-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.x86_64", product_id: "docker-runc-kubic-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.x86_64", }, }, { category: "product_version", name: "docker-test-19.03.14_ce-98.57.1.x86_64", product: { name: "docker-test-19.03.14_ce-98.57.1.x86_64", product_id: "docker-test-19.03.14_ce-98.57.1.x86_64", }, }, { category: "product_version", name: "fish-2.7.1-1.3.1.x86_64", product: { name: "fish-2.7.1-1.3.1.x86_64", product_id: "fish-2.7.1-1.3.1.x86_64", }, }, { category: "product_version", name: "fish-devel-2.7.1-1.3.1.x86_64", product: { name: "fish-devel-2.7.1-1.3.1.x86_64", product_id: "fish-devel-2.7.1-1.3.1.x86_64", }, }, { category: "product_version", name: "golang-github-docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.x86_64", product: { name: "golang-github-docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.x86_64", product_id: "golang-github-docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.x86_64", }, }, { category: "product_version", name: "golang-github-docker-libnetwork-kubic-0.7.0.1+gitr2908_55e924b8a842-34.1.x86_64", product: { name: "golang-github-docker-libnetwork-kubic-0.7.0.1+gitr2908_55e924b8a842-34.1.x86_64", product_id: "golang-github-docker-libnetwork-kubic-0.7.0.1+gitr2908_55e924b8a842-34.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Containers 12", product: { name: "SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-containers:12", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "containerd-1.3.9-16.32.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12:containerd-1.3.9-16.32.1.ppc64le", }, product_reference: "containerd-1.3.9-16.32.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Containers 12", }, { category: "default_component_of", full_product_name: { name: "containerd-1.3.9-16.32.1.s390x as component of SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12:containerd-1.3.9-16.32.1.s390x", }, product_reference: "containerd-1.3.9-16.32.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Containers 12", }, { category: "default_component_of", full_product_name: { name: "containerd-1.3.9-16.32.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12:containerd-1.3.9-16.32.1.x86_64", }, product_reference: "containerd-1.3.9-16.32.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Containers 12", }, { category: "default_component_of", full_product_name: { name: "docker-19.03.14_ce-98.57.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12:docker-19.03.14_ce-98.57.1.ppc64le", }, product_reference: "docker-19.03.14_ce-98.57.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Containers 12", }, { category: "default_component_of", full_product_name: { name: "docker-19.03.14_ce-98.57.1.s390x as component of SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12:docker-19.03.14_ce-98.57.1.s390x", }, product_reference: "docker-19.03.14_ce-98.57.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Containers 12", }, { category: "default_component_of", full_product_name: { name: "docker-19.03.14_ce-98.57.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12:docker-19.03.14_ce-98.57.1.x86_64", }, product_reference: "docker-19.03.14_ce-98.57.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Containers 12", }, { category: "default_component_of", full_product_name: { name: "docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12:docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.ppc64le", }, product_reference: "docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Containers 12", }, { category: "default_component_of", full_product_name: { name: "docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.s390x as component of SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12:docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.s390x", }, product_reference: "docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Containers 12", }, { category: "default_component_of", full_product_name: { name: "docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12:docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.x86_64", }, product_reference: "docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Containers 12", }, { category: "default_component_of", full_product_name: { name: "docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12:docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.ppc64le", }, product_reference: "docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Containers 12", }, { category: "default_component_of", full_product_name: { name: "docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.s390x as component of SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12:docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.s390x", }, product_reference: "docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Containers 12", }, { category: "default_component_of", full_product_name: { name: "docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12:docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.x86_64", }, product_reference: "docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Containers 12", }, ], }, vulnerabilities: [ { cve: "CVE-2020-15257", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-15257", }, ], notes: [ { category: "general", text: "containerd is an industry-standard container runtime and is available as a daemon for Linux and Windows. In containerd before versions 1.3.9 and 1.4.3, the containerd-shim API is improperly exposed to host network containers. Access controls for the shim's API socket verified that the connecting process had an effective UID of 0, but did not otherwise restrict access to the abstract Unix domain socket. This would allow malicious containers running in the same network namespace as the shim, with an effective UID of 0 but otherwise reduced privileges, to cause new processes to be run with elevated privileges. This vulnerability has been fixed in containerd 1.3.9 and 1.4.3. Users should update to these versions as soon as they are released. It should be noted that containers started with an old version of containerd-shim should be stopped and restarted, as running containers will continue to be vulnerable even after an upgrade. If you are not providing the ability for untrusted users to start containers in the same network namespace as the shim (typically the \"host\" network namespace, for example with docker run --net=host or hostNetwork: true in a Kubernetes pod) and run with an effective UID of 0, you are not vulnerable to this issue. If you are running containers with a vulnerable configuration, you can deny access to all abstract sockets with AppArmor by adding a line similar to deny unix addr=@**, to your policy. It is best practice to run containers with a reduced set of privileges, with a non-zero UID, and with isolated namespaces. The containerd maintainers strongly advise against sharing namespaces with the host. Reducing the set of isolation mechanisms used for a container necessarily increases that container's privilege, regardless of what container runtime is used for running that container.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:containerd-1.3.9-16.32.1.ppc64le", "SUSE Linux Enterprise Module for Containers 12:containerd-1.3.9-16.32.1.s390x", "SUSE Linux Enterprise Module for Containers 12:containerd-1.3.9-16.32.1.x86_64", "SUSE Linux Enterprise Module for Containers 12:docker-19.03.14_ce-98.57.1.ppc64le", "SUSE Linux Enterprise Module for Containers 12:docker-19.03.14_ce-98.57.1.s390x", "SUSE Linux Enterprise Module for Containers 12:docker-19.03.14_ce-98.57.1.x86_64", "SUSE Linux Enterprise Module for Containers 12:docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.ppc64le", "SUSE Linux Enterprise Module for Containers 12:docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.s390x", "SUSE Linux Enterprise Module for Containers 12:docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.x86_64", "SUSE Linux Enterprise Module for Containers 12:docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.ppc64le", "SUSE Linux Enterprise Module for Containers 12:docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.s390x", "SUSE Linux Enterprise Module for Containers 12:docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-15257", url: "https://www.suse.com/security/cve/CVE-2020-15257", }, { category: "external", summary: "SUSE Bug 1178969 for CVE-2020-15257", url: "https://bugzilla.suse.com/1178969", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:containerd-1.3.9-16.32.1.ppc64le", "SUSE Linux Enterprise Module for Containers 12:containerd-1.3.9-16.32.1.s390x", "SUSE Linux Enterprise Module for Containers 12:containerd-1.3.9-16.32.1.x86_64", "SUSE Linux Enterprise Module for Containers 12:docker-19.03.14_ce-98.57.1.ppc64le", "SUSE Linux Enterprise Module for Containers 12:docker-19.03.14_ce-98.57.1.s390x", "SUSE Linux Enterprise Module for Containers 12:docker-19.03.14_ce-98.57.1.x86_64", "SUSE Linux Enterprise Module for Containers 12:docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.ppc64le", "SUSE Linux Enterprise Module for Containers 12:docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.s390x", "SUSE Linux Enterprise Module for Containers 12:docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.x86_64", "SUSE Linux Enterprise Module for Containers 12:docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.ppc64le", "SUSE Linux Enterprise Module for Containers 12:docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.s390x", "SUSE Linux Enterprise Module for Containers 12:docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:containerd-1.3.9-16.32.1.ppc64le", "SUSE Linux Enterprise Module for Containers 12:containerd-1.3.9-16.32.1.s390x", "SUSE Linux Enterprise Module for Containers 12:containerd-1.3.9-16.32.1.x86_64", "SUSE Linux Enterprise Module for Containers 12:docker-19.03.14_ce-98.57.1.ppc64le", "SUSE Linux Enterprise Module for Containers 12:docker-19.03.14_ce-98.57.1.s390x", "SUSE Linux Enterprise Module for Containers 12:docker-19.03.14_ce-98.57.1.x86_64", "SUSE Linux Enterprise Module for Containers 12:docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.ppc64le", "SUSE Linux Enterprise Module for Containers 12:docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.s390x", "SUSE Linux Enterprise Module for Containers 12:docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-34.1.x86_64", "SUSE Linux Enterprise Module for Containers 12:docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.ppc64le", "SUSE Linux Enterprise Module for Containers 12:docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.s390x", "SUSE Linux Enterprise Module for Containers 12:docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-1.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-28T13:28:52Z", details: "important", }, ], title: "CVE-2020-15257", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.