Synopsis
Important: container-tools:rhel8 security and bug fix update
Type/Severity
Security Advisory: Important
Topic
An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
- HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
- HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
- runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc (CVE-2019-16884)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- avc: podman run --security-opt label=type:svirt_qemu_net_t (BZ#1764318)
- backport json-file logging support to 1.4.2 (BZ#1770176)
- Selinux won't allow SCTP inter pod communication (BZ#1774382)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
Affected Products
-
Red Hat Enterprise Linux for x86_64 8 x86_64
-
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64
-
Red Hat Enterprise Linux for IBM z Systems 8 s390x
-
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x
-
Red Hat Enterprise Linux for Power, little endian 8 ppc64le
-
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le
-
Red Hat Enterprise Linux for ARM 64 8 aarch64
-
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64
-
Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le
-
Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64
Fixes
- BZ - 1735645 - CVE-2019-9512 HTTP/2: flood using PING frames results in unbounded memory growth
- BZ - 1735744 - CVE-2019-9514 HTTP/2: flood using HEADERS frames results in unbounded memory growth
- BZ - 1757214 - CVE-2019-16884 runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc
- BZ - 1764318 - avc: podman run --security-opt label=type:svirt_qemu_net_t [rhel-8.1.0.z]
- BZ - 1770176 - backport json-file logging support to 1.4.2 [rhel-8.1.0.z]
- BZ - 1774382 - Selinux won't allow SCTP inter pod communication [rhel-8.1.0.z]
CVEs
References