Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.853705
Category:SuSE Local Security Checks
Title:openSUSE: Security Advisory for containerd, (openSUSE-SU-2021:0278-1)
Summary:The remote host is missing an update for the 'containerd, '; package(s) announced via the openSUSE-SU-2021:0278-1 advisory.
Description:Summary:
The remote host is missing an update for the 'containerd, '
package(s) announced via the openSUSE-SU-2021:0278-1 advisory.

Vulnerability Insight:
This update for containerd, docker, docker-runc,
golang-github-docker-libnetwork fixes the following issues:

Security issues fixed:

- CVE-2020-15257: Fixed a privilege escalation in containerd (bsc#1178969).

- CVE-2021-21284: potential privilege escalation when the root user in the
remapped namespace has access to the host filesystem (bsc#1181732)

- CVE-2021-21285: pulling a malformed Docker image manifest crashes the
dockerd daemon (bsc#1181730)

Non-security issues fixed:

- Update Docker to 19.03.15-ce. See upstream changelog in the packaged
/usr/share/doc/packages/docker/CHANGELOG.md. This update includes fixes
for bsc#1181732 (CVE-2021-21284) and bsc#1181730 (CVE-2021-21285).

- Only apply the boo#1178801 libnetwork patch to handle firewalld on
openSUSE. It appears that SLES doesn't like the patch. (bsc#1180401)

- Update to containerd v1.3.9, which is needed for Docker v19.03.14-ce and
fixes CVE-2020-15257. bsc#1180243

- Update to containerd v1.3.7, which is required for Docker 19.03.13-ce.
bsc#1176708

- Update to Docker 19.03.14-ce. See upstream changelog in the packaged
/usr/share/doc/packages/docker/CHANGELOG.md. CVE-2020-15257 bsc#1180243

- Enable fish-completion

- Add a patch which makes Docker compatible with firewalld with nftables
backend.
(bsc#1178801, SLE-16460)

- Update to Docker 19.03.13-ce. See upstream changelog in the packaged
/usr/share/doc/packages/docker/CHANGELOG.md. bsc#1176708

- Fixes for %_libexecdir changing to /usr/libexec (bsc#1174075)

- Emergency fix: %requires_eq does not work with provide symbols,
only effective package names. Convert back to regular Requires.

- Update to Docker 19.03.12-ce. See upstream changelog in the packaged
/usr/share/doc/packages/docker/CHANGELOG.md.

- Use Go 1.13 instead of Go 1.14 because Go 1.14 can cause all sorts of
spurious errors due to Go returning -EINTR from I/O syscalls much more
often (due to Go 1.14's preemptive goroutine support).

- Add BuildRequires for all -git dependencies so that we catch missing
dependencies much more quickly.

- Update to libnetwork 55e924b8a842, which is required for Docker
19.03.14-ce. ...

Description truncated. Please see the references for more information.

Affected Software/OS:
'containerd, ' package(s) on openSUSE Leap 15.2.

Solution:
Please install the updated package(s).

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2020-15257
https://github.com/containerd/containerd/security/advisories/GHSA-36xw-fx78-c5r4
Debian Security Information: DSA-4865 (Google Search)
https://www.debian.org/security/2021/dsa-4865
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNKXLOLZWO5FMAPX63ZL7JNKTNNT5NQD/
https://security.gentoo.org/glsa/202105-33
https://github.com/containerd/containerd/commit/4a4bb851f5da563ff6e68a83dc837c7699c469ad
https://github.com/containerd/containerd/releases/tag/v1.4.3
Common Vulnerability Exposure (CVE) ID: CVE-2021-21284
https://github.com/moby/moby/security/advisories/GHSA-7452-xqpj-6rpc
https://security.gentoo.org/glsa/202107-23
https://docs.docker.com/engine/release-notes/#20103
https://github.com/moby/moby/commit/64bd4485b3a66a597c02c95f5776395e540b2c7c
https://github.com/moby/moby/releases/tag/v19.03.15
https://github.com/moby/moby/releases/tag/v20.10.3
Common Vulnerability Exposure (CVE) ID: CVE-2021-21285
https://github.com/moby/moby/security/advisories/GHSA-6fj5-m822-rqx8
https://github.com/moby/moby/commit/8d3179546e79065adefa67cc697c09d0ab137d30
CopyrightCopyright (C) 2021 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.