AlmaLinux 8 : container-tools:rhel8 (ALSA-2022:1762)

high Nessus Plugin ID 161143

Synopsis

The remote AlmaLinux host is missing one or more security updates.

Description

The remote AlmaLinux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the ALSA-2022:1762 advisory.

- A privilege escalation flaw was found in Podman. This flaw allows an attacker to publish a malicious image to a public registry. Once this image is downloaded by a potential victim, the vulnerability is triggered after a user runs the 'podman top' command. This action gives the attacker access to the host filesystem, leading to information disclosure or denial of service. (CVE-2022-1227)

- client_golang is the instrumentation library for Go applications in Prometheus, and the promhttp package in client_golang provides tooling around HTTP servers and clients. In client_golang prior to version 1.11.1, HTTP server is susceptible to a Denial of Service through unbounded cardinality, and potential memory exhaustion, when handling requests with non-standard HTTP methods. In order to be affected, an instrumented software must use any of `promhttp.InstrumentHandler*` middleware except `RequestsInFlight`;
not filter any specific methods (e.g GET) before middleware; pass metric with `method` label name to our middleware; and not have any firewall/LB/proxy that filters away requests with unknown `method`.
client_golang version 1.11.1 contains a patch for this issue. Several workarounds are available, including removing the `method` label name from counter/gauge used in the InstrumentHandler; turning off affected promhttp handlers; adding custom middleware before promhttp handler that will sanitize the request method given by Go http.Request; and using a reverse proxy or web application firewall, configured to only allow a limited set of methods. (CVE-2022-21698)

- A flaw was found in Podman, where containers were started incorrectly with non-empty default permissions.
A vulnerability was found in Moby (Docker Engine), where containers were started incorrectly with non- empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs.
(CVE-2022-27649)

- A flaw was found in crun where containers were incorrectly started with non-empty default permissions. A vulnerability was found in Moby (Docker Engine) where containers were started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs.
(CVE-2022-27650)

- A flaw was found in buildah where containers were incorrectly started with non-empty default permissions.
A bug was found in Moby (Docker Engine) where containers were incorrectly started with non-empty inheritable Linux process capabilities, enabling an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs. This has the potential to impact confidentiality and integrity. (CVE-2022-27651)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://errata.almalinux.org/8/ALSA-2022-1762.html

Plugin Details

Severity: High

ID: 161143

File Name: alma_linux_ALSA-2022-1762.nasl

Version: 1.2

Type: local

Published: 5/12/2022

Updated: 5/12/2022

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: E:U/RL:OF/RC:C

CVSS Score Source: CVE-2022-1227

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:alma:linux:aardvark-dns, p-cpe:/a:alma:linux:buildah, p-cpe:/a:alma:linux:buildah-tests, p-cpe:/a:alma:linux:cockpit-podman, p-cpe:/a:alma:linux:conmon, p-cpe:/a:alma:linux:container-selinux, p-cpe:/a:alma:linux:containernetworking-plugins, p-cpe:/a:alma:linux:containers-common, p-cpe:/a:alma:linux:crit, p-cpe:/a:alma:linux:criu, p-cpe:/a:alma:linux:criu-devel, p-cpe:/a:alma:linux:criu-libs, p-cpe:/a:alma:linux:crun, p-cpe:/a:alma:linux:fuse-overlayfs, p-cpe:/a:alma:linux:libslirp, p-cpe:/a:alma:linux:libslirp-devel, p-cpe:/a:alma:linux:netavark, p-cpe:/a:alma:linux:oci-seccomp-bpf-hook, p-cpe:/a:alma:linux:podman, p-cpe:/a:alma:linux:podman-catatonit, p-cpe:/a:alma:linux:podman-docker, p-cpe:/a:alma:linux:podman-gvproxy, p-cpe:/a:alma:linux:podman-plugins, p-cpe:/a:alma:linux:podman-remote, p-cpe:/a:alma:linux:podman-tests, p-cpe:/a:alma:linux:python3-criu, p-cpe:/a:alma:linux:python3-podman, p-cpe:/a:alma:linux:runc, p-cpe:/a:alma:linux:skopeo, p-cpe:/a:alma:linux:skopeo-tests, p-cpe:/a:alma:linux:slirp4netns, p-cpe:/a:alma:linux:toolbox, p-cpe:/a:alma:linux:toolbox-tests, p-cpe:/a:alma:linux:udica, cpe:/o:alma:linux:8

Required KB Items: Host/local_checks_enabled, Host/AlmaLinux/release, Host/AlmaLinux/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 5/10/2022

Vulnerability Publication Date: 2/15/2022

Reference Information

CVE: CVE-2022-1227, CVE-2022-21698, CVE-2022-27649, CVE-2022-27650, CVE-2022-27651

ALSA: 2022:1762