SB2020042902 - Red Hat Enterprise Linux 8 update for the container-tools:rhel8 module
Published: April 29, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Improper access control (CVE-ID: CVE-2019-19921)
The vulnerability allows a local user to gain unauthorized access to sensitive information.
The vulnerability exists due to improper access restrictions, related to libcontainer/rootfs_linux.go in runc. A local user with ability to spawn two containers with custom volume-mount configurations, and run custom images can escalate privileges on the system.
2) Resource exhaustion (CVE-ID: CVE-2020-1702)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application reads the entire image manifest file into memory. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack by supplying a huge manifest file.
3) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-1726)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume.T
Remediation
Install update from vendor's website.