SB2020042902 - Red Hat Enterprise Linux 8 update for the container-tools:rhel8 module



SB2020042902 - Red Hat Enterprise Linux 8 update for the container-tools:rhel8 module

Published: April 29, 2020

Security Bulletin ID SB2020042902
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 33% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Improper access control (CVE-ID: CVE-2019-19921)

The vulnerability allows a local user to gain unauthorized access to sensitive information.

The vulnerability exists due to improper access restrictions, related to libcontainer/rootfs_linux.go in runc. A local user with ability to spawn two containers with custom volume-mount configurations, and run custom images can escalate privileges on the system.


2) Resource exhaustion (CVE-ID: CVE-2020-1702)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application reads the entire image manifest file into memory. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack by supplying a huge manifest file.


3) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-1726)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume.T


Remediation

Install update from vendor's website.