Security update for containerd, docker, runc

SUSE Security Update: Security update for containerd, docker, runc
Announcement ID: SUSE-SU-2021:1458-1
Rating: important
References: #1028638 #1034053 #1048046 #1051429 #1053532 #1095817 #1118897 #1118898 #1118899 #1121967 #1131314 #1131553 #1149954 #1152308 #1160452 #1168481 #1175081 #1175821 #1181594 #1181641 #1181677 #1181730 #1181732 #1181749 #1182451 #1182476 #1182947 #1183024 #1183397 #1183855 #1184768 #1184962
Cross-References:CVE-2018-16873 CVE-2018-16874 CVE-2018-16875 CVE-2019-16884 CVE-2019-19921 CVE-2019-5736 CVE-2021-21284 CVE-2021-21285 CVE-2021-21334
Affected Products:
  • SUSE Linux Enterprise Module for Containers 12

An update that solves 9 vulnerabilities and has 23 fixes is now available.

Description:

This update for containerd, docker, runc fixes the following issues:

  • Docker was updated to 20.10.6-ce * Switch version to use -ce suffix rather than _ce to avoid confusing other tools (bsc#1182476). * CVE-2021-21284: Fixed a potential privilege escalation when the root user in the remapped namespace has access to the host filesystem (bsc#1181732) * CVE-2021-21285: Fixed an issue where pulling a malformed Docker image manifest crashes the dockerd daemon (bsc#1181730).

  • runc was updated to v1.0.0~rc93 (bsc#1182451 and bsc#1184962). * Use the upstream runc package (bsc#1181641, bsc#1181677, bsc#1175821). * Fixed /dev/null is not available (bsc#1168481). * Fixed an issue where podman hangs when spawned by salt-minion process (bsc#1149954). * CVE-2019-19921: Fixed a race condition with shared mounts (bsc#1160452). * CVE-2019-16884: Fixed an LSM bypass via malicious Docker image that mount over a /proc directory (bsc#1152308). * CVE-2019-5736: Fixed potential write attacks to the host runc binary (bsc#1121967). * Fixed an issue where after a kernel-update docker doesn't run (bsc#1131314 bsc#1131553) * Ensure that we always include the version information in runc (bsc#1053532).

  • Switch to Go 1.13 for build. * CVE-2018-16873: Fixed a potential remote code execution (bsc#1118897). * CVE-2018-16874: Fixed a directory traversal in "go get" via curly braces in import paths (bsc#1118898). * CVE-2018-16875: Fixed a CPU denial of service (bsc#1118899). * Fixed an issue with building containers (bsc#1095817).

  • containerd was updated to v1.4.4 * CVE-2021-21334: Fixed a potential information leak through environment variables (bsc#1183397). * Handle a requirement from docker (bsc#1181594). * Install the containerd-shim* binaries and stop creating (bsc#1183024). * update version to the one required by docker (bsc#1034053)

  • Use -buildmode=pie for tests and binary build (bsc#1048046, bsc#1051429)
  • Cleanup seccomp builds similar (bsc#1028638).
  • Update to handle the docker-runc removal, and drop the -kubic flavour (bsc#1181677, bsc#1181749)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Module for Containers 12:
    zypper in -t patch SUSE-SLE-Module-Containers-12-2021-1458=1

Package List:

  • SUSE Linux Enterprise Module for Containers 12 (ppc64le s390x x86_64):
    • containerd-1.4.4-16.38.1
    • docker-20.10.6_ce-98.66.1
    • docker-debuginfo-20.10.6_ce-98.66.1
    • runc-1.0.0~rc93-16.8.1
    • runc-debuginfo-1.0.0~rc93-16.8.1

References: