2024-12-12 21:07:30 +00:00

101 lines
3.5 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20192850",
"Version": "oval:org.altlinux.errata:def:20192850",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2019-2850: package `runc` update to version 1.0.0-alt10.rc9",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2019-2850",
"RefURL": "https://errata.altlinux.org/ALT-PU-2019-2850",
"Source": "ALTPU"
},
{
"RefID": "BDU:2020-04920",
"RefURL": "https://bdu.fstec.ru/vul/2020-04920",
"Source": "BDU"
},
{
"RefID": "CVE-2019-16884",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-16884",
"Source": "CVE"
}
],
"Description": "This update upgrades runc to version 1.0.0-alt10.rc9. \nSecurity Fix(es):\n\n * BDU:2020-04920: Уязвимость компонента AppArmor инструмента для запуска изолированных контейнеров runc, связанная с недостатками механизма авторизации, позволяющая нарушителю монтировать вредоносный образ Docker в каталог /proc\n\n * CVE-2019-16884: runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2019-10-10"
},
"Updated": {
"Date": "2019-10-10"
},
"BDUs": [
{
"ID": "BDU:2020-04920",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-863",
"Href": "https://bdu.fstec.ru/vul/2020-04920",
"Impact": "High",
"Public": "20190925"
}
],
"CVEs": [
{
"ID": "CVE-2019-16884",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-863",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-16884",
"Impact": "High",
"Public": "20190925"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:5001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20192850001",
"Comment": "runc is earlier than 0:1.0.0-alt10.rc9"
}
]
}
]
}
}
]
}