RHEL 8 : container-tools:rhel8 (RHSA-2022:7822)

high Nessus Plugin ID 167179

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2022:7822 advisory.

The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

Security Fix(es):

* podman: possible information disclosure and modification (CVE-2022-2989)

* buildah: possible information disclosure and modification (CVE-2022-2990)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* podman creates lock file in /etc/cni/net.d/cni.lock instead of /run/lock/ (BZ#2125644)

* (podman image trust) does not support the new trust type sigstoreSigned (BZ#2125645)

* podman kill may deadlock (BZ#2125647)

* Error: runc: exec failed: unable to start container process: open /dev/pts/0: operation not permitted:
OCI permission denied [RHEL 8.7] (BZ#2125648)

* containers-common-1-44 is missing RPM-GPG-KEY-redhat-beta [RHEL 8.7] (BZ#2125686)

* ADD Dockerfile reference is not validating HTTP status code [rhel8-8.7.0] (BZ#2129767)

* Two aardvark-dns instances trying to use the same port on the same interface. [rhel-8.7.0.z] (netavark) (BZ#2130234)

* containers config.json gets empty after sudden power loss (BZ#2130236)

* PANIC podman API service endpoint handler panic (BZ#2132412)

* Podman container got global IPv6 address unexpectedly even when macvlan network is created for pure IPv4 network (BZ#2133390)

* Skopeo push image to redhat quay with sigstore was failed (BZ#2136406)

* Podman push image to redhat quay with sigstore was failed (BZ#2136433)

* Buildah push image to redhat quay with sigstore was failed (BZ#2136438)

* Two aardvark-dns instances trying to use the same port on the same interface. [rhel-8.8] (aardvark-dns) (BZ#2137295)

Enhancement(s):

* [RFE]Podman support to perform custom actions on unhealthy containers (BZ#2130911)

* [RFE] python-podman: Podman support to perform custom actions on unhealthy containers (BZ#2132360)

* Podman volume plugin timeout should be configurable (BZ#2132992)

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?790bc9ea

http://www.nessus.org/u?7f1795d3

https://access.redhat.com/security/updates/classification/#low

https://bugzilla.redhat.com/show_bug.cgi?id=2121445

https://bugzilla.redhat.com/show_bug.cgi?id=2121453

https://bugzilla.redhat.com/show_bug.cgi?id=2125644

https://bugzilla.redhat.com/show_bug.cgi?id=2125645

https://bugzilla.redhat.com/show_bug.cgi?id=2125647

https://bugzilla.redhat.com/show_bug.cgi?id=2125648

https://bugzilla.redhat.com/show_bug.cgi?id=2125686

https://bugzilla.redhat.com/show_bug.cgi?id=2129767

https://bugzilla.redhat.com/show_bug.cgi?id=2130234

https://bugzilla.redhat.com/show_bug.cgi?id=2130236

https://bugzilla.redhat.com/show_bug.cgi?id=2130911

https://bugzilla.redhat.com/show_bug.cgi?id=2132360

https://bugzilla.redhat.com/show_bug.cgi?id=2132412

https://bugzilla.redhat.com/show_bug.cgi?id=2132992

https://bugzilla.redhat.com/show_bug.cgi?id=2133390

https://bugzilla.redhat.com/show_bug.cgi?id=2136406

https://bugzilla.redhat.com/show_bug.cgi?id=2136433

https://bugzilla.redhat.com/show_bug.cgi?id=2136438

https://bugzilla.redhat.com/show_bug.cgi?id=2137295

https://access.redhat.com/errata/RHSA-2022:7822

Plugin Details

Severity: High

ID: 167179

File Name: redhat-RHSA-2022-7822.nasl

Version: 1.9

Type: local

Agent: unix

Published: 11/9/2022

Updated: 11/8/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

Vendor

Vendor Severity: Low

CVSS v2

Risk Factor: Medium

Base Score: 6.2

Temporal Score: 4.9

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:N

CVSS Score Source: CVE-2022-2990

CVSS v3

Risk Factor: High

Base Score: 7.1

Temporal Score: 6.4

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:conmon, p-cpe:/a:redhat:enterprise_linux:containers-common, p-cpe:/a:redhat:enterprise_linux:crun, p-cpe:/a:redhat:enterprise_linux:python-podman, p-cpe:/a:redhat:enterprise_linux:podman-gvproxy, p-cpe:/a:redhat:enterprise_linux:aardvark-dns, p-cpe:/a:redhat:enterprise_linux:buildah-tests, p-cpe:/a:redhat:enterprise_linux:buildah, p-cpe:/a:redhat:enterprise_linux:crit, p-cpe:/a:redhat:enterprise_linux:podman-remote, p-cpe:/a:redhat:enterprise_linux:podman, p-cpe:/a:redhat:enterprise_linux:podman-catatonit, p-cpe:/a:redhat:enterprise_linux:libslirp-devel, p-cpe:/a:redhat:enterprise_linux:podman-plugins, p-cpe:/a:redhat:enterprise_linux:podman-tests, p-cpe:/a:redhat:enterprise_linux:python3-podman, p-cpe:/a:redhat:enterprise_linux:criu-libs, p-cpe:/a:redhat:enterprise_linux:containernetworking-plugins, p-cpe:/a:redhat:enterprise_linux:container-selinux, p-cpe:/a:redhat:enterprise_linux:skopeo-tests, p-cpe:/a:redhat:enterprise_linux:podman-docker, cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:redhat:enterprise_linux:udica, p-cpe:/a:redhat:enterprise_linux:netavark, p-cpe:/a:redhat:enterprise_linux:oci-seccomp-bpf-hook, p-cpe:/a:redhat:enterprise_linux:runc, p-cpe:/a:redhat:enterprise_linux:toolbox-tests, p-cpe:/a:redhat:enterprise_linux:skopeo, p-cpe:/a:redhat:enterprise_linux:criu-devel, p-cpe:/a:redhat:enterprise_linux:toolbox, p-cpe:/a:redhat:enterprise_linux:libslirp, p-cpe:/a:redhat:enterprise_linux:cockpit-podman, p-cpe:/a:redhat:enterprise_linux:criu, p-cpe:/a:redhat:enterprise_linux:slirp4netns, p-cpe:/a:redhat:enterprise_linux:fuse-overlayfs, p-cpe:/a:redhat:enterprise_linux:python3-criu

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/8/2022

Vulnerability Publication Date: 9/13/2022

Reference Information

CVE: CVE-2022-2989, CVE-2022-2990

CWE: 842

RHSA: 2022:7822