Oracle Linux 8 : container-tools:rhel8 (ELSA-2019-0975)

high Nessus Plugin ID 127569

Synopsis

The remote Oracle Linux host is missing one or more security updates.

Description

From Red Hat Security Advisory 2019:0975 :

An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

Security Fix(es) :

* A flaw was found in the way runc handled system file descriptors when running containers. A malicious container could use this flaw to overwrite contents of the runc binary and consequently run arbitrary commands on the container host system. (CVE-2019-5736)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es) :

* [stream rhel8] rebase container-selinux to 2.94 (BZ#1693675)

* [stream rhel8] unable to mount disk at `/var/lib/containers` via `systemd` unit when `container-selinux` policy installed (BZ#1695669)

* [stream rhel8] don't allow a container to connect to random services (BZ# 1695689)

Solution

Update the affected container-tools:rhel8 packages.

See Also

https://oss.oracle.com/pipermail/el-errata/2019-August/008959.html

Plugin Details

Severity: High

ID: 127569

File Name: oraclelinux_ELSA-2019-0975.nasl

Version: 1.7

Type: local

Agent: unix

Published: 8/12/2019

Updated: 9/22/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

CVSS Score Rationale: Score based on analysis of the vendor notes.

VPR

Risk Factor: Critical

Score: 10.0

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: manual

CVSS v3

Risk Factor: High

Base Score: 8.6

Temporal Score: 8.2

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:oracle:linux:buildah, p-cpe:/a:oracle:linux:container-selinux, p-cpe:/a:oracle:linux:containernetworking-plugins, p-cpe:/a:oracle:linux:containers-common, p-cpe:/a:oracle:linux:fuse-overlayfs, p-cpe:/a:oracle:linux:oci-systemd-hook, p-cpe:/a:oracle:linux:oci-umount, p-cpe:/a:oracle:linux:podman, p-cpe:/a:oracle:linux:podman-docker, p-cpe:/a:oracle:linux:runc, p-cpe:/a:oracle:linux:skopeo, p-cpe:/a:oracle:linux:slirp4netns, cpe:/o:oracle:linux:8

Required KB Items: Host/local_checks_enabled, Host/OracleLinux, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/1/2019

Vulnerability Publication Date: 2/11/2019

Exploitable With

Metasploit (Docker Container Escape Via runC Overwrite)

Reference Information

CVE: CVE-2019-5736

RHSA: 2019:0975