[ALSA-2019:0975] Important: container-tools:rhel8 security and bug fix update
Type:
security
Severity:
important
Release date:
2019-05-07
Description:
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * A flaw was found in the way runc handled system file descriptors when running containers. A malicious container could use this flaw to overwrite contents of the runc binary and consequently run arbitrary commands on the container host system. (CVE-2019-5736) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * [stream rhel8] rebase container-selinux to 2.94 (BZ#1693675) * [stream rhel8] unable to mount disk at `/var/lib/containers` via `systemd` unit when `container-selinux` policy installed (BZ#1695669) * [stream rhel8] don't allow a container to connect to random services (BZ#1695689)
Updated packages listed below:
Architecture Package Checksum
aarch64 oci-umount-2.3.4-2.git87f9237.module_el8.4.0+2496+12421f43.aarch64.rpm 770d344d61dc1877c84a45a546afae1a8f23794049e5a2ec2a2da48f0ebf626b
aarch64 oci-systemd-hook-0.1.15-2.git2d0b8a3.module_el8.4.0+2496+12421f43.aarch64.rpm 82a7c609f0920121fc1ce28ccf8a437f07063d9b4d2c930cec3d6894d962fe15
ppc64le oci-systemd-hook-0.1.15-2.git2d0b8a3.module_el8.5.0+119+9a9ec082.ppc64le.rpm 3f0297ea60af68d82bac1e3ff0466762adac366c8888335e60681908c5146ba7
ppc64le oci-umount-2.3.4-2.git87f9237.module_el8.5.0+119+9a9ec082.ppc64le.rpm 6a69d33989417b5db165ed7f7d5c377e2da96c932944e9aeb391bb252300e3c1
x86_64 oci-umount-2.3.4-2.git87f9237.module_el8.3.0+2044+12421f43.x86_64.rpm 82477f79b1e2569d7909cf5e334b443d2c90c7e7ae710bb25826a793f46c0e6e
x86_64 oci-systemd-hook-0.1.15-2.git2d0b8a3.module_el8.3.0+2044+12421f43.x86_64.rpm b0316c313c77ab89cb757717f70d4033c6593a3ea657981a4c351d397629218a
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.