openSUSE-SU-2019:0170-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/openSUSE-SU-2019:0170-1.json
JSON Data
https://api.osv.dev/v1/vulns/openSUSE-SU-2019:0170-1
Related
Published
2019-02-13T16:51:49Z
Modified
2019-02-13T16:51:49Z
Summary
Security update for runc
Details

This update for runc fixes the following issues:

Security vulnerabilities addressed:

  • CVE-2019-5736: Effectively copying /proc/self/exe during re-exec to avoid write attacks to the host runc binary, which could lead to a container breakout (bsc#1121967)
  • CVE-2018-16873: Fix a remote command execution during 'go get -u' (boo#1118897)
  • CVE-2018-16874: Fix a directory traversal in 'go get' via curly braces in import paths (boo#1118898)
  • CVE-2018-16875: Fix a CPU denial of service issue (boo#1118899)

Other changes and bug fixes:

  • Update go requirements to >= go1.10
  • Create a symlink in /usr/bin/runc to enable rootless Podman and Buildah.
  • Make use of %license macro
  • Remove 'go test' from %check section, as it has only ever caused us problems and hasn't (as far as I remember) ever caught a release-blocking issue. Smoke testing has been far more useful. (boo#1095817)
  • Upgrade to runc v1.0.0~rc6. Upstream changelog is available from https://github.com/opencontainers/runc/releases/tag/v1.0.0-rc6
References

Affected packages

SUSE:Package Hub 15 / runc

Package

Name
runc
Purl
purl:rpm/suse/runc&distro=SUSE%20Package%20Hub%2015

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.0~rc6-bp150.2.3.1

Ecosystem specific

{
    "binaries": [
        {
            "runc": "1.0.0~rc6-bp150.2.3.1",
            "runc-test": "1.0.0~rc6-bp150.2.3.1"
        }
    ]
}