[RHSA-2019:4269] container-tools:rhel8 security and bug fix update
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc (CVE-2019-16884)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
avc: podman run --security-opt label=type:svirt_qemu_net_t (BZ#1764318)
backport json-file logging support to 1.4.2 (BZ#1770176)
Selinux won't allow SCTP inter pod communication (BZ#1774382)
- ID
- RHSA-2019:4269
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2019:4269
- Published
-
2019-12-17T00:00:00
(4 years ago) - Modified
-
2019-12-17T00:00:00
(4 years ago) - Rights
- Copyright 2019 Red Hat, Inc.
- Other Advisories
-
- ALAS-2019-1270
- ALAS-2021-1556
- ALAS2-2019-1272
- ALPINE:CVE-2019-16884
- ALPINE:CVE-2019-9512
- ALPINE:CVE-2019-9514
- ALSA-2019:2925
- ALSA-2019:4269
- ALSA-2019:4273
- ASA-201908-15
- DSA-4503-1
- DSA-4508-1
- DSA-4520-1
- DSA-4669-1
- ELSA-2019-2726
- ELSA-2019-2925
- ELSA-2019-4269
- ELSA-2019-4273
- ELSA-2019-4816
- FEDORA-2019-34e097c66c
- FEDORA-2019-3fc86a518b
- FEDORA-2019-416d20f960
- FEDORA-2019-55d101a740
- FEDORA-2019-5a6a7bc12c
- FEDORA-2019-65db7ad6c7
- FEDORA-2019-6a2980de56
- FEDORA-2019-96946c39dd
- FEDORA-2019-bd4843561c
- FEDORA-2019-e99c1603c3
- FEDORA-2020-830d8a1a92
- FEDORA-2020-b2c1f6cc75
- FREEBSD:41F4BAAC-BF77-11E9-8D2F-5404A68AD561
- FREEBSD:72A5579E-C765-11E9-8052-0028F8D09152
- FREEBSD:73B1E734-C74E-11E9-8052-0028F8D09152
- FREEBSD:9FBAEFB3-837E-11EA-B5B4-641C67A117D8
- FREEBSD:C97A940B-C392-11E9-BB38-000D3AB229D6
- GLSA-202003-21
- GO-2021-0085
- GO-2022-0536
- MS:CVE-2019-16884
- MS:CVE-2019-9512
- MS:CVE-2019-9514
- openSUSE-SU-2019:2000-1
- openSUSE-SU-2019:2056-1
- openSUSE-SU-2019:2072-1
- openSUSE-SU-2019:2085-1
- openSUSE-SU-2019:2114-1
- openSUSE-SU-2019:2115-1
- openSUSE-SU-2019:2130-1
- openSUSE-SU-2019:2418-1
- openSUSE-SU-2019:2434-1
- openSUSE-SU-2020:0045-1
- openSUSE-SU-2020:0398-1
- RHSA-2019:2726
- RHSA-2019:2925
- RHSA-2019:4273
- RLSA-2019:2925
- RLSA-2019:4269
- RLSA-2019:4273
- SUSE-SU-2019:2213-1
- SUSE-SU-2019:2214-1
- SUSE-SU-2019:2254-1
- SUSE-SU-2019:2259-1
- SUSE-SU-2019:2260-1
- SUSE-SU-2019:2786-1
- SUSE-SU-2019:2787-1
- SUSE-SU-2019:2810-1
- SUSE-SU-2020:0035-1
- SUSE-SU-2020:0059-1
- SUSE-SU-2020:0065-1
- SUSE-SU-2020:0697-1
- SUSE-SU-2021:1458-1
- USN-4297-1
- USN-4308-1
- USN-4866-1
- USN-4867-1
- VU:605641
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 1735645 | https://bugzilla.redhat.com/1735645 | |
Bugzilla | 1735744 | https://bugzilla.redhat.com/1735744 | |
Bugzilla | 1744588 | https://bugzilla.redhat.com/1744588 | |
Bugzilla | 1757214 | https://bugzilla.redhat.com/1757214 | |
RHSA | RHSA-2019:4269 | https://access.redhat.com/errata/RHSA-2019:4269 | |
CVE | CVE-2019-16884 | https://access.redhat.com/security/cve/CVE-2019-16884 | |
CVE | CVE-2019-18466 | https://access.redhat.com/security/cve/CVE-2019-18466 | |
CVE | CVE-2019-9512 | https://access.redhat.com/security/cve/CVE-2019-9512 | |
CVE | CVE-2019-9514 | https://access.redhat.com/security/cve/CVE-2019-9514 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/toolbox?arch=x86_64&distro=redhat-8.1 | redhat | toolbox | < 0.0.4-1.module+el8.1.0+4081+b29780af | redhat-8.1 | x86_64 | |
Affected | pkg:rpm/redhat/toolbox?arch=s390x&distro=redhat-8.1 | redhat | toolbox | < 0.0.4-1.module+el8.1.0+4081+b29780af | redhat-8.1 | s390x | |
Affected | pkg:rpm/redhat/toolbox?arch=ppc64le&distro=redhat-8.1 | redhat | toolbox | < 0.0.4-1.module+el8.1.0+4081+b29780af | redhat-8.1 | ppc64le | |
Affected | pkg:rpm/redhat/toolbox?arch=aarch64&distro=redhat-8.1 | redhat | toolbox | < 0.0.4-1.module+el8.1.0+4081+b29780af | redhat-8.1 | aarch64 | |
Affected | pkg:rpm/redhat/slirp4netns?arch=x86_64&distro=redhat-8.1 | redhat | slirp4netns | < 0.3.0-4.module+el8.1.0+4306+1d917805 | redhat-8.1 | x86_64 | |
Affected | pkg:rpm/redhat/slirp4netns?arch=s390x&distro=redhat-8.1 | redhat | slirp4netns | < 0.3.0-4.module+el8.1.0+4306+1d917805 | redhat-8.1 | s390x | |
Affected | pkg:rpm/redhat/slirp4netns?arch=ppc64le&distro=redhat-8.1 | redhat | slirp4netns | < 0.3.0-4.module+el8.1.0+4306+1d917805 | redhat-8.1 | ppc64le | |
Affected | pkg:rpm/redhat/slirp4netns?arch=aarch64&distro=redhat-8.1 | redhat | slirp4netns | < 0.3.0-4.module+el8.1.0+4306+1d917805 | redhat-8.1 | aarch64 | |
Affected | pkg:rpm/redhat/skopeo?arch=x86_64&distro=redhat-8.1 | redhat | skopeo | < 0.1.37-6.module+el8.1.0+4876+e678a192 | redhat-8.1 | x86_64 | |
Affected | pkg:rpm/redhat/skopeo?arch=s390x&distro=redhat-8.1 | redhat | skopeo | < 0.1.37-6.module+el8.1.0+4876+e678a192 | redhat-8.1 | s390x | |
Affected | pkg:rpm/redhat/skopeo?arch=ppc64le&distro=redhat-8.1 | redhat | skopeo | < 0.1.37-6.module+el8.1.0+4876+e678a192 | redhat-8.1 | ppc64le | |
Affected | pkg:rpm/redhat/skopeo?arch=aarch64&distro=redhat-8.1 | redhat | skopeo | < 0.1.37-6.module+el8.1.0+4876+e678a192 | redhat-8.1 | aarch64 | |
Affected | pkg:rpm/redhat/skopeo-tests?arch=x86_64&distro=redhat-8.1 | redhat | skopeo-tests | < 0.1.37-6.module+el8.1.0+4876+e678a192 | redhat-8.1 | x86_64 | |
Affected | pkg:rpm/redhat/skopeo-tests?arch=s390x&distro=redhat-8.1 | redhat | skopeo-tests | < 0.1.37-6.module+el8.1.0+4876+e678a192 | redhat-8.1 | s390x | |
Affected | pkg:rpm/redhat/skopeo-tests?arch=ppc64le&distro=redhat-8.1 | redhat | skopeo-tests | < 0.1.37-6.module+el8.1.0+4876+e678a192 | redhat-8.1 | ppc64le | |
Affected | pkg:rpm/redhat/skopeo-tests?arch=aarch64&distro=redhat-8.1 | redhat | skopeo-tests | < 0.1.37-6.module+el8.1.0+4876+e678a192 | redhat-8.1 | aarch64 | |
Affected | pkg:rpm/redhat/runc?arch=x86_64&distro=redhat-8.1 | redhat | runc | < 1.0.0-61.rc8.module+el8.1.0+4873+4a24e241 | redhat-8.1 | x86_64 | |
Affected | pkg:rpm/redhat/runc?arch=s390x&distro=redhat-8.1 | redhat | runc | < 1.0.0-61.rc8.module+el8.1.0+4873+4a24e241 | redhat-8.1 | s390x | |
Affected | pkg:rpm/redhat/runc?arch=ppc64le&distro=redhat-8.1 | redhat | runc | < 1.0.0-61.rc8.module+el8.1.0+4873+4a24e241 | redhat-8.1 | ppc64le | |
Affected | pkg:rpm/redhat/runc?arch=aarch64&distro=redhat-8.1 | redhat | runc | < 1.0.0-61.rc8.module+el8.1.0+4873+4a24e241 | redhat-8.1 | aarch64 | |
Affected | pkg:rpm/redhat/python-podman-api?distro=redhat-8.1 | redhat | python-podman-api | < 1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af | redhat-8.1 | ||
Affected | pkg:rpm/redhat/podman?arch=x86_64&distro=redhat-8.1 | redhat | podman | < 1.4.2-6.module+el8.1.0+4830+f49150d7 | redhat-8.1 | x86_64 | |
Affected | pkg:rpm/redhat/podman?arch=s390x&distro=redhat-8.1 | redhat | podman | < 1.4.2-6.module+el8.1.0+4830+f49150d7 | redhat-8.1 | s390x | |
Affected | pkg:rpm/redhat/podman?arch=ppc64le&distro=redhat-8.1 | redhat | podman | < 1.4.2-6.module+el8.1.0+4830+f49150d7 | redhat-8.1 | ppc64le | |
Affected | pkg:rpm/redhat/podman?arch=aarch64&distro=redhat-8.1 | redhat | podman | < 1.4.2-6.module+el8.1.0+4830+f49150d7 | redhat-8.1 | aarch64 | |
Affected | pkg:rpm/redhat/podman-tests?arch=x86_64&distro=redhat-8.1 | redhat | podman-tests | < 1.4.2-6.module+el8.1.0+4830+f49150d7 | redhat-8.1 | x86_64 | |
Affected | pkg:rpm/redhat/podman-tests?arch=s390x&distro=redhat-8.1 | redhat | podman-tests | < 1.4.2-6.module+el8.1.0+4830+f49150d7 | redhat-8.1 | s390x | |
Affected | pkg:rpm/redhat/podman-tests?arch=ppc64le&distro=redhat-8.1 | redhat | podman-tests | < 1.4.2-6.module+el8.1.0+4830+f49150d7 | redhat-8.1 | ppc64le | |
Affected | pkg:rpm/redhat/podman-tests?arch=aarch64&distro=redhat-8.1 | redhat | podman-tests | < 1.4.2-6.module+el8.1.0+4830+f49150d7 | redhat-8.1 | aarch64 | |
Affected | pkg:rpm/redhat/podman-remote?arch=x86_64&distro=redhat-8.1 | redhat | podman-remote | < 1.4.2-6.module+el8.1.0+4830+f49150d7 | redhat-8.1 | x86_64 | |
Affected | pkg:rpm/redhat/podman-remote?arch=s390x&distro=redhat-8.1 | redhat | podman-remote | < 1.4.2-6.module+el8.1.0+4830+f49150d7 | redhat-8.1 | s390x | |
Affected | pkg:rpm/redhat/podman-remote?arch=ppc64le&distro=redhat-8.1 | redhat | podman-remote | < 1.4.2-6.module+el8.1.0+4830+f49150d7 | redhat-8.1 | ppc64le | |
Affected | pkg:rpm/redhat/podman-remote?arch=aarch64&distro=redhat-8.1 | redhat | podman-remote | < 1.4.2-6.module+el8.1.0+4830+f49150d7 | redhat-8.1 | aarch64 | |
Affected | pkg:rpm/redhat/podman-manpages?distro=redhat-8.1 | redhat | podman-manpages | < 1.4.2-6.module+el8.1.0+4830+f49150d7 | redhat-8.1 | ||
Affected | pkg:rpm/redhat/podman-docker?distro=redhat-8.1 | redhat | podman-docker | < 1.4.2-6.module+el8.1.0+4830+f49150d7 | redhat-8.1 | ||
Affected | pkg:rpm/redhat/oci-umount?arch=x86_64&distro=redhat-8.1 | redhat | oci-umount | < 2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af | redhat-8.1 | x86_64 | |
Affected | pkg:rpm/redhat/oci-umount?arch=s390x&distro=redhat-8.1 | redhat | oci-umount | < 2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af | redhat-8.1 | s390x | |
Affected | pkg:rpm/redhat/oci-umount?arch=ppc64le&distro=redhat-8.1 | redhat | oci-umount | < 2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af | redhat-8.1 | ppc64le | |
Affected | pkg:rpm/redhat/oci-umount?arch=aarch64&distro=redhat-8.1 | redhat | oci-umount | < 2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af | redhat-8.1 | aarch64 | |
Affected | pkg:rpm/redhat/oci-systemd-hook?arch=x86_64&distro=redhat-8.1 | redhat | oci-systemd-hook | < 0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af | redhat-8.1 | x86_64 | |
Affected | pkg:rpm/redhat/oci-systemd-hook?arch=s390x&distro=redhat-8.1 | redhat | oci-systemd-hook | < 0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af | redhat-8.1 | s390x | |
Affected | pkg:rpm/redhat/oci-systemd-hook?arch=ppc64le&distro=redhat-8.1 | redhat | oci-systemd-hook | < 0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af | redhat-8.1 | ppc64le | |
Affected | pkg:rpm/redhat/oci-systemd-hook?arch=aarch64&distro=redhat-8.1 | redhat | oci-systemd-hook | < 0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af | redhat-8.1 | aarch64 | |
Affected | pkg:rpm/redhat/fuse-overlayfs?arch=x86_64&distro=redhat-8.1 | redhat | fuse-overlayfs | < 0.4.1-1.module+el8.1.0+4081+b29780af | redhat-8.1 | x86_64 | |
Affected | pkg:rpm/redhat/fuse-overlayfs?arch=s390x&distro=redhat-8.1 | redhat | fuse-overlayfs | < 0.4.1-1.module+el8.1.0+4081+b29780af | redhat-8.1 | s390x | |
Affected | pkg:rpm/redhat/fuse-overlayfs?arch=ppc64le&distro=redhat-8.1 | redhat | fuse-overlayfs | < 0.4.1-1.module+el8.1.0+4081+b29780af | redhat-8.1 | ppc64le | |
Affected | pkg:rpm/redhat/fuse-overlayfs?arch=aarch64&distro=redhat-8.1 | redhat | fuse-overlayfs | < 0.4.1-1.module+el8.1.0+4081+b29780af | redhat-8.1 | aarch64 | |
Affected | pkg:rpm/redhat/containers-common?arch=x86_64&distro=redhat-8.1 | redhat | containers-common | < 0.1.37-6.module+el8.1.0+4876+e678a192 | redhat-8.1 | x86_64 | |
Affected | pkg:rpm/redhat/containers-common?arch=s390x&distro=redhat-8.1 | redhat | containers-common | < 0.1.37-6.module+el8.1.0+4876+e678a192 | redhat-8.1 | s390x | |
Affected | pkg:rpm/redhat/containers-common?arch=ppc64le&distro=redhat-8.1 | redhat | containers-common | < 0.1.37-6.module+el8.1.0+4876+e678a192 | redhat-8.1 | ppc64le | |
Affected | pkg:rpm/redhat/containers-common?arch=aarch64&distro=redhat-8.1 | redhat | containers-common | < 0.1.37-6.module+el8.1.0+4876+e678a192 | redhat-8.1 | aarch64 | |
Affected | pkg:rpm/redhat/containernetworking-plugins?arch=x86_64&distro=redhat-8.1 | redhat | containernetworking-plugins | < 0.8.1-3.module+el8.1.0+4881+045289ee | redhat-8.1 | x86_64 | |
Affected | pkg:rpm/redhat/containernetworking-plugins?arch=s390x&distro=redhat-8.1 | redhat | containernetworking-plugins | < 0.8.1-3.module+el8.1.0+4881+045289ee | redhat-8.1 | s390x | |
Affected | pkg:rpm/redhat/containernetworking-plugins?arch=ppc64le&distro=redhat-8.1 | redhat | containernetworking-plugins | < 0.8.1-3.module+el8.1.0+4881+045289ee | redhat-8.1 | ppc64le | |
Affected | pkg:rpm/redhat/containernetworking-plugins?arch=aarch64&distro=redhat-8.1 | redhat | containernetworking-plugins | < 0.8.1-3.module+el8.1.0+4881+045289ee | redhat-8.1 | aarch64 | |
Affected | pkg:rpm/redhat/container-selinux?distro=redhat-8.1 | redhat | container-selinux | < 2.123.0-2.module+el8.1.0+4900+9d7326b8 | redhat-8.1 | ||
Affected | pkg:rpm/redhat/cockpit-podman?distro=redhat-8.1 | redhat | cockpit-podman | < 4-1.module+el8.1.0+4081+b29780af | redhat-8.1 | ||
Affected | pkg:rpm/redhat/buildah?arch=x86_64&distro=redhat-8.1 | redhat | buildah | < 1.9.0-5.module+el8.1.0+4240+893c1ab8 | redhat-8.1 | x86_64 | |
Affected | pkg:rpm/redhat/buildah?arch=s390x&distro=redhat-8.1 | redhat | buildah | < 1.9.0-5.module+el8.1.0+4240+893c1ab8 | redhat-8.1 | s390x | |
Affected | pkg:rpm/redhat/buildah?arch=ppc64le&distro=redhat-8.1 | redhat | buildah | < 1.9.0-5.module+el8.1.0+4240+893c1ab8 | redhat-8.1 | ppc64le | |
Affected | pkg:rpm/redhat/buildah?arch=aarch64&distro=redhat-8.1 | redhat | buildah | < 1.9.0-5.module+el8.1.0+4240+893c1ab8 | redhat-8.1 | aarch64 | |
Affected | pkg:rpm/redhat/buildah-tests?arch=x86_64&distro=redhat-8.1 | redhat | buildah-tests | < 1.9.0-5.module+el8.1.0+4240+893c1ab8 | redhat-8.1 | x86_64 | |
Affected | pkg:rpm/redhat/buildah-tests?arch=s390x&distro=redhat-8.1 | redhat | buildah-tests | < 1.9.0-5.module+el8.1.0+4240+893c1ab8 | redhat-8.1 | s390x | |
Affected | pkg:rpm/redhat/buildah-tests?arch=ppc64le&distro=redhat-8.1 | redhat | buildah-tests | < 1.9.0-5.module+el8.1.0+4240+893c1ab8 | redhat-8.1 | ppc64le | |
Affected | pkg:rpm/redhat/buildah-tests?arch=aarch64&distro=redhat-8.1 | redhat | buildah-tests | < 1.9.0-5.module+el8.1.0+4240+893c1ab8 | redhat-8.1 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |