openSUSE Security Update : containerd / docker / docker-runc / etc (openSUSE-2019-1499)

high Nessus Plugin ID 125697

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for containerd, docker, docker-runc, go, go1.11, go1.12, golang-github-docker-libnetwork fixes the following issues :

Security issues fixed :

- CVE-2019-5736: containerd: Fixing container breakout vulnerability (bsc#1121967).

- CVE-2019-6486: go security release, fixing crypto/elliptic CPU DoS vulnerability affecting P-521 and P-384 (bsc#1123013).

- CVE-2018-16873: go secuirty release, fixing cmd/go remote command execution (bsc#1118897).

- CVE-2018-16874: go security release, fixing cmd/go directory traversal (bsc#1118898).

- CVE-2018-16875: go security release, fixing crypto/x509 CPU denial of service (bsc#1118899).

Other changes and bug fixes :

- Update to containerd v1.2.5, which is required for v18.09.5-ce (bsc#1128376, bsc#1134068).

- Update to runc 2b18fe1d885e, which is required for Docker v18.09.5-ce (bsc#1128376, bsc#1134068).

- Update to Docker 18.09.5-ce see upstream changelog in the packaged (bsc#1128376, bsc#1134068).

- docker-test: Improvements to test packaging (bsc#1128746).

- Move daemon.json file to /etc/docker directory (bsc#1114832).

- Revert golang(API) removal since it turns out this breaks >= requires in certain cases (bsc#1114209).

- Fix go build failures (bsc#1121397).

This update was imported from the SUSE:SLE-15:Update update project.

Solution

Update the affected containerd / docker / docker-runc / etc packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1114209

https://bugzilla.opensuse.org/show_bug.cgi?id=1114832

https://bugzilla.opensuse.org/show_bug.cgi?id=1118897

https://bugzilla.opensuse.org/show_bug.cgi?id=1118898

https://bugzilla.opensuse.org/show_bug.cgi?id=1118899

https://bugzilla.opensuse.org/show_bug.cgi?id=1121397

https://bugzilla.opensuse.org/show_bug.cgi?id=1121967

https://bugzilla.opensuse.org/show_bug.cgi?id=1123013

https://bugzilla.opensuse.org/show_bug.cgi?id=1128376

https://bugzilla.opensuse.org/show_bug.cgi?id=1128746

https://bugzilla.opensuse.org/show_bug.cgi?id=1134068

Plugin Details

Severity: High

ID: 125697

File Name: openSUSE-2019-1499.nasl

Version: 1.5

Type: local

Agent: unix

Published: 6/4/2019

Updated: 5/17/2024

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 10.0

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2019-5736

CVSS v3

Risk Factor: High

Base Score: 8.6

Temporal Score: 8.2

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:golang-github-docker-libnetwork, cpe:/o:novell:opensuse:15.0, p-cpe:/a:novell:opensuse:docker-test, p-cpe:/a:novell:opensuse:go1.11-race, p-cpe:/a:novell:opensuse:docker-libnetwork, p-cpe:/a:novell:opensuse:docker, p-cpe:/a:novell:opensuse:containerd, p-cpe:/a:novell:opensuse:containerd-ctr, p-cpe:/a:novell:opensuse:go1.12-race, p-cpe:/a:novell:opensuse:docker-zsh-completion, p-cpe:/a:novell:opensuse:docker-debugsource, p-cpe:/a:novell:opensuse:go1.11, p-cpe:/a:novell:opensuse:go1.12, p-cpe:/a:novell:opensuse:docker-debuginfo, p-cpe:/a:novell:opensuse:docker-bash-completion, p-cpe:/a:novell:opensuse:go-race, p-cpe:/a:novell:opensuse:docker-runc-test, p-cpe:/a:novell:opensuse:containerd-test, p-cpe:/a:novell:opensuse:docker-runc-debuginfo, p-cpe:/a:novell:opensuse:docker-runc, p-cpe:/a:novell:opensuse:docker-test-debuginfo, p-cpe:/a:novell:opensuse:docker-libnetwork-debuginfo, p-cpe:/a:novell:opensuse:go

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/3/2019

Vulnerability Publication Date: 12/14/2018

Exploitable With

Metasploit (Docker Container Escape Via runC Overwrite)

Reference Information

CVE: CVE-2018-16873, CVE-2018-16874, CVE-2018-16875, CVE-2019-5736, CVE-2019-6486