docker-1.13.1-161.git64e9980.0.1.el7.AXS7

エラータID: AXSA:2020-4546:03

Release date: 
Thursday, April 2, 2020 - 05:52
Subject: 
docker-1.13.1-161.git64e9980.0.1.el7.AXS7
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
Moderate
Description: 

Docker is an open-source engine that automates the deployment of any application as a lightweight, portable, self-sufficient container that runs virtually anywhere.

Security Fix(es):

* runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc (CVE-2019-16884)

* proglottis/gpgme: Use-after-free in GPGME bindings during container image pull (CVE-2020-8945)

* containers/image: Container images read entire image manifest into memory (CVE-2020-1702)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Whitelist statx(2) in docker

* Upgrading docker resulting into increase Systemd logs

* docker should be linked against gpgme-pthread

* docker cannot be updated to 108 on rhos13 as a container fails to start with "pivot_root invalid argument" error.

* OVS pods are unable to stop when running under docker version 1.13.1-108

CVE-2019-16884
runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.
CVE-2020-1702
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2020-8945
The proglottis Go wrapper before 0.1.1 for the GPGME library has a use-after-free, as demonstrated by use for container image pulls by Docker or CRI-O. This leads to a crash or potential code execution during GPG signature verification.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. docker-1.13.1-161.git64e9980.0.1.el7.AXS7.src.rpm
    MD5: ee4f59c5a6f895d7c23a2fe36a79f29b
    SHA-256: 6e11ae124abe5a44c8658d935fa79cefef9f67201933aad737af14b4ceeb84a9
    Size: 15.05 MB

Asianux Server 7 for x86_64
  1. docker-1.13.1-161.git64e9980.0.1.el7.AXS7.x86_64.rpm
    MD5: 5495f24ea1f070ddee0ff168afd8358c
    SHA-256: 441c63d6fcdb77795fc91405f5171bcd8dec4fb2711035db0121ae162cdcaded
    Size: 17.67 MB
  2. docker-client-1.13.1-161.git64e9980.0.1.el7.AXS7.x86_64.rpm
    MD5: 02371349bffefb3c745dac971e740fbb
    SHA-256: 073e0f12153aad4ad381e5916387b976121c712ed80aa4050075121d647e065f
    Size: 3.90 MB
  3. docker-common-1.13.1-161.git64e9980.0.1.el7.AXS7.x86_64.rpm
    MD5: 3167baf139b751df8f90c0ba3633394e
    SHA-256: 5ead7772c13b61db9e31fbc7f468d31264018ef8a7a4e3ecfce94b8d32ad068e
    Size: 98.42 kB
  4. docker-logrotate-1.13.1-161.git64e9980.0.1.el7.AXS7.x86_64.rpm
    MD5: eb5115872e41f31ecef4770a35d99fc9
    SHA-256: 702908df0d57a00046ad5f0fbf63700fbef72a1868f46498096e96e31ed076de
    Size: 96.39 kB
  5. docker-lvm-plugin-1.13.1-161.git64e9980.0.1.el7.AXS7.x86_64.rpm
    MD5: f3e730ffd148d0760a740e43f4265168
    SHA-256: 23377b546f81096b69d6fb78f482edbc652af0a6975ca8303700334097e62d65
    Size: 1.87 MB
  6. docker-novolume-plugin-1.13.1-161.git64e9980.0.1.el7.AXS7.x86_64.rpm
    MD5: 2083c2127a15de401e7d2e99ad9692a2
    SHA-256: e7e48f3dcfefdb3846c35c2d81d438ef31a9ab867c9984229aefde713814014c
    Size: 1.89 MB
  7. docker-v1.10-migrator-1.13.1-161.git64e9980.0.1.el7.AXS7.x86_64.rpm
    MD5: a7f811b35ad2a3e6dfedfba2d9cf01f9
    SHA-256: 2319717df36d9f85099bcea14d6d50426d81dd9df959b56d12980c5f68bac2ef
    Size: 2.68 MB