-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Important: docker security update
Advisory ID:       RHSA-2019:0304-01
Product:           Red Hat Enterprise Linux Extras
Advisory URL:      https://access.redhat.com/errata/RHSA-2019:0304
Issue date:        2019-02-11
CVE Names:         CVE-2019-5736 
====================================================================
1. Summary:

An update for docker is now available for Red Hat Enterprise Linux 7
Extras.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux 7 Extras - aarch64, ppc64le, s390x, x86_64

3. Description:

Docker is an open-source engine that automates the deployment of any
application as a lightweight, portable, self-sufficient container that runs
virtually anywhere.

Security Fix(es):

* A flaw was found in the way runc handled system file descriptors when
running containers. A malicious container could use this flaw to overwrite
contents of the runc binary and consequently run arbitrary commands on the
container host system. (CVE-2019-5736)

Additional details about this flaw, including mitigation information, can
be found in the vulnerability article linked from the Reference section.

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1664908 - CVE-2019-5736 runc: Execution of malicious containers allows for container escape and access to host filesystem

6. Package List:

Red Hat Enterprise Linux 7 Extras:

Source:
docker-1.13.1-91.git07f3374.el7.src.rpm

aarch64:
docker-1.13.1-91.git07f3374.el7.aarch64.rpm
docker-client-1.13.1-91.git07f3374.el7.aarch64.rpm
docker-common-1.13.1-91.git07f3374.el7.aarch64.rpm
docker-debuginfo-1.13.1-91.git07f3374.el7.aarch64.rpm
docker-logrotate-1.13.1-91.git07f3374.el7.aarch64.rpm
docker-lvm-plugin-1.13.1-91.git07f3374.el7.aarch64.rpm
docker-novolume-plugin-1.13.1-91.git07f3374.el7.aarch64.rpm
docker-rhel-push-plugin-1.13.1-91.git07f3374.el7.aarch64.rpm
docker-v1.10-migrator-1.13.1-91.git07f3374.el7.aarch64.rpm

ppc64le:
docker-1.13.1-91.git07f3374.el7.ppc64le.rpm
docker-client-1.13.1-91.git07f3374.el7.ppc64le.rpm
docker-common-1.13.1-91.git07f3374.el7.ppc64le.rpm
docker-debuginfo-1.13.1-91.git07f3374.el7.ppc64le.rpm
docker-logrotate-1.13.1-91.git07f3374.el7.ppc64le.rpm
docker-lvm-plugin-1.13.1-91.git07f3374.el7.ppc64le.rpm
docker-novolume-plugin-1.13.1-91.git07f3374.el7.ppc64le.rpm
docker-rhel-push-plugin-1.13.1-91.git07f3374.el7.ppc64le.rpm
docker-v1.10-migrator-1.13.1-91.git07f3374.el7.ppc64le.rpm

s390x:
docker-1.13.1-91.git07f3374.el7.s390x.rpm
docker-client-1.13.1-91.git07f3374.el7.s390x.rpm
docker-common-1.13.1-91.git07f3374.el7.s390x.rpm
docker-debuginfo-1.13.1-91.git07f3374.el7.s390x.rpm
docker-logrotate-1.13.1-91.git07f3374.el7.s390x.rpm
docker-lvm-plugin-1.13.1-91.git07f3374.el7.s390x.rpm
docker-novolume-plugin-1.13.1-91.git07f3374.el7.s390x.rpm
docker-rhel-push-plugin-1.13.1-91.git07f3374.el7.s390x.rpm
docker-v1.10-migrator-1.13.1-91.git07f3374.el7.s390x.rpm

x86_64:
docker-1.13.1-91.git07f3374.el7.x86_64.rpm
docker-client-1.13.1-91.git07f3374.el7.x86_64.rpm
docker-common-1.13.1-91.git07f3374.el7.x86_64.rpm
docker-debuginfo-1.13.1-91.git07f3374.el7.x86_64.rpm
docker-logrotate-1.13.1-91.git07f3374.el7.x86_64.rpm
docker-lvm-plugin-1.13.1-91.git07f3374.el7.x86_64.rpm
docker-novolume-plugin-1.13.1-91.git07f3374.el7.x86_64.rpm
docker-rhel-push-plugin-1.13.1-91.git07f3374.el7.x86_64.rpm
docker-v1.10-migrator-1.13.1-91.git07f3374.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-5736
https://access.redhat.com/security/vulnerabilities/runcescape
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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eF1G
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2019-0304:01 Important: docker security update

An update for docker is now available for Red Hat Enterprise Linux 7 Extras

Summary

Docker is an open-source engine that automates the deployment of any application as a lightweight, portable, self-sufficient container that runs virtually anywhere.
Security Fix(es):
* A flaw was found in the way runc handled system file descriptors when running containers. A malicious container could use this flaw to overwrite contents of the runc binary and consequently run arbitrary commands on the container host system. (CVE-2019-5736)
Additional details about this flaw, including mitigation information, can be found in the vulnerability article linked from the Reference section.
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2019-5736 https://access.redhat.com/security/vulnerabilities/runcescape https://access.redhat.com/security/updates/classification/#important

Package List

Red Hat Enterprise Linux 7 Extras:
Source: docker-1.13.1-91.git07f3374.el7.src.rpm
aarch64: docker-1.13.1-91.git07f3374.el7.aarch64.rpm docker-client-1.13.1-91.git07f3374.el7.aarch64.rpm docker-common-1.13.1-91.git07f3374.el7.aarch64.rpm docker-debuginfo-1.13.1-91.git07f3374.el7.aarch64.rpm docker-logrotate-1.13.1-91.git07f3374.el7.aarch64.rpm docker-lvm-plugin-1.13.1-91.git07f3374.el7.aarch64.rpm docker-novolume-plugin-1.13.1-91.git07f3374.el7.aarch64.rpm docker-rhel-push-plugin-1.13.1-91.git07f3374.el7.aarch64.rpm docker-v1.10-migrator-1.13.1-91.git07f3374.el7.aarch64.rpm
ppc64le: docker-1.13.1-91.git07f3374.el7.ppc64le.rpm docker-client-1.13.1-91.git07f3374.el7.ppc64le.rpm docker-common-1.13.1-91.git07f3374.el7.ppc64le.rpm docker-debuginfo-1.13.1-91.git07f3374.el7.ppc64le.rpm docker-logrotate-1.13.1-91.git07f3374.el7.ppc64le.rpm docker-lvm-plugin-1.13.1-91.git07f3374.el7.ppc64le.rpm docker-novolume-plugin-1.13.1-91.git07f3374.el7.ppc64le.rpm docker-rhel-push-plugin-1.13.1-91.git07f3374.el7.ppc64le.rpm docker-v1.10-migrator-1.13.1-91.git07f3374.el7.ppc64le.rpm
s390x: docker-1.13.1-91.git07f3374.el7.s390x.rpm docker-client-1.13.1-91.git07f3374.el7.s390x.rpm docker-common-1.13.1-91.git07f3374.el7.s390x.rpm docker-debuginfo-1.13.1-91.git07f3374.el7.s390x.rpm docker-logrotate-1.13.1-91.git07f3374.el7.s390x.rpm docker-lvm-plugin-1.13.1-91.git07f3374.el7.s390x.rpm docker-novolume-plugin-1.13.1-91.git07f3374.el7.s390x.rpm docker-rhel-push-plugin-1.13.1-91.git07f3374.el7.s390x.rpm docker-v1.10-migrator-1.13.1-91.git07f3374.el7.s390x.rpm
x86_64: docker-1.13.1-91.git07f3374.el7.x86_64.rpm docker-client-1.13.1-91.git07f3374.el7.x86_64.rpm docker-common-1.13.1-91.git07f3374.el7.x86_64.rpm docker-debuginfo-1.13.1-91.git07f3374.el7.x86_64.rpm docker-logrotate-1.13.1-91.git07f3374.el7.x86_64.rpm docker-lvm-plugin-1.13.1-91.git07f3374.el7.x86_64.rpm docker-novolume-plugin-1.13.1-91.git07f3374.el7.x86_64.rpm docker-rhel-push-plugin-1.13.1-91.git07f3374.el7.x86_64.rpm docker-v1.10-migrator-1.13.1-91.git07f3374.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2019:0304-01
Product: Red Hat Enterprise Linux Extras
Advisory URL: https://access.redhat.com/errata/RHSA-2019:0304
Issued Date: : 2019-02-11
CVE Names: CVE-2019-5736

Topic

An update for docker is now available for Red Hat Enterprise Linux 7Extras.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux 7 Extras - aarch64, ppc64le, s390x, x86_64


Bugs Fixed

1664908 - CVE-2019-5736 runc: Execution of malicious containers allows for container escape and access to host filesystem


Related News