openSUSE Security Update : containerd / docker / docker-runc / etc (openSUSE-2019-2021)

high Nessus Plugin ID 128409

Language:

New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for containerd, docker, docker-runc, golang-github-docker-libnetwork fixes the following issues :

Docker :

- CVE-2019-14271: Fixed a code injection if the nsswitch facility dynamically loaded a library inside a chroot (bsc#1143409).

- CVE-2019-13509: Fixed an information leak in the debug log (bsc#1142160).

- Update to version 19.03.1-ce, see changelog at /usr/share/doc/packages/docker/CHANGELOG.md (bsc#1142413, bsc#1139649).

runc :

- Use %config(noreplace) for /etc/docker/daemon.json (bsc#1138920).

- Update to runc 425e105d5a03, which is required by Docker (bsc#1139649).

containerd :

- CVE-2019-5736: Fixed a container breakout vulnerability (bsc#1121967).

- Update to containerd v1.2.6, which is required by docker (bsc#1139649).

golang-github-docker-libnetwork :

- Update to version git.fc5a7d91d54cc98f64fc28f9e288b46a0bee756c, which is required by docker (bsc#1142413, bsc#1139649).

This update was imported from the SUSE:SLE-15:Update update project.

Solution

Update the affected containerd / docker / docker-runc / etc packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1100331

https://bugzilla.opensuse.org/show_bug.cgi?id=1121967

https://bugzilla.opensuse.org/show_bug.cgi?id=1138920

https://bugzilla.opensuse.org/show_bug.cgi?id=1139649

https://bugzilla.opensuse.org/show_bug.cgi?id=1142160

https://bugzilla.opensuse.org/show_bug.cgi?id=1142413

https://bugzilla.opensuse.org/show_bug.cgi?id=1143409

Plugin Details

Severity: High

ID: 128409

File Name: openSUSE-2019-2021.nasl

Version: 1.7

Type: local

Agent: unix

Published: 8/30/2019

Updated: 7/1/2021

Dependencies: ssh_get_info.nasl

Risk Information

CVSS Score Source: CVE-2019-5736

VPR

Risk Factor: Critical

Score: 10

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

CVSS v3

Risk Factor: High

Base Score: 8.6

Temporal Score: 8.2

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:o:novell:opensuse:15.1:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:docker:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:docker-bash-completion:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:docker-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:docker-zsh-completion:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:docker-test:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:containerd:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:containerd-ctr:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:docker-libnetwork:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:docker-libnetwork-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:docker-runc:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:docker-runc-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:docker-test-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:golang-github-docker-libnetwork:*:*:*:*:*:*:*

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/29/2019

Vulnerability Publication Date: 7/6/2018

Exploitable With

Metasploit (Docker Container Escape Via runC Overwrite)

Reference Information

CVE: CVE-2019-5736, CVE-2018-10892, CVE-2019-13509, CVE-2019-14271