Rocky Linux 8 : container-tools:rhel8 (RLSA-2021:1796)

medium Nessus Plugin ID 184546

Synopsis

The remote Rocky Linux host is missing one or more security updates.

Description

The remote Rocky Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RLSA-2021:1796 advisory.

- A nil pointer dereference in the golang.org/x/crypto/ssh component through v0.0.0-20201203163018-be400aefbc4c for Go allows remote attackers to cause a denial of service against SSH servers. (CVE-2020-29652)

- Rootless containers run with Podman, receive all traffic with a source IP address of 127.0.0.1 (including from remote hosts). This impacts containerized applications that trust localhost (127.0.01) connections by default and do not require authentication. This issue affects Podman 1.8.0 onwards. (CVE-2021-20199)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://errata.rockylinux.org/RLSA-2021:1796

https://bugzilla.redhat.com/show_bug.cgi?id=1707078

https://bugzilla.redhat.com/show_bug.cgi?id=1724946

https://bugzilla.redhat.com/show_bug.cgi?id=1726442

https://bugzilla.redhat.com/show_bug.cgi?id=1763007

https://bugzilla.redhat.com/show_bug.cgi?id=1770037

https://bugzilla.redhat.com/show_bug.cgi?id=1798278

https://bugzilla.redhat.com/show_bug.cgi?id=1811773

https://bugzilla.redhat.com/show_bug.cgi?id=1838233

https://bugzilla.redhat.com/show_bug.cgi?id=1841485

https://bugzilla.redhat.com/show_bug.cgi?id=1844199

https://bugzilla.redhat.com/show_bug.cgi?id=1853455

https://bugzilla.redhat.com/show_bug.cgi?id=1860176

https://bugzilla.redhat.com/show_bug.cgi?id=1867892

https://bugzilla.redhat.com/show_bug.cgi?id=1881894

https://bugzilla.redhat.com/show_bug.cgi?id=1897282

https://bugzilla.redhat.com/show_bug.cgi?id=1897594

https://bugzilla.redhat.com/show_bug.cgi?id=1902979

https://bugzilla.redhat.com/show_bug.cgi?id=1903813

https://bugzilla.redhat.com/show_bug.cgi?id=1904549

https://bugzilla.redhat.com/show_bug.cgi?id=1908883

https://bugzilla.redhat.com/show_bug.cgi?id=1915383

https://bugzilla.redhat.com/show_bug.cgi?id=1918554

https://bugzilla.redhat.com/show_bug.cgi?id=1919050

https://bugzilla.redhat.com/show_bug.cgi?id=1921128

https://bugzilla.redhat.com/show_bug.cgi?id=1923986

https://bugzilla.redhat.com/show_bug.cgi?id=1924146

https://bugzilla.redhat.com/show_bug.cgi?id=1931545

https://bugzilla.redhat.com/show_bug.cgi?id=1931785

https://bugzilla.redhat.com/show_bug.cgi?id=1932083

https://bugzilla.redhat.com/show_bug.cgi?id=1935376

https://bugzilla.redhat.com/show_bug.cgi?id=1935922

https://bugzilla.redhat.com/show_bug.cgi?id=1936927

https://bugzilla.redhat.com/show_bug.cgi?id=1937487

https://bugzilla.redhat.com/show_bug.cgi?id=1938234

Plugin Details

Severity: Medium

ID: 184546

File Name: rocky_linux_RLSA-2021-1796.nasl

Version: 1.1

Type: local

Published: 11/6/2023

Updated: 12/8/2023

Supported Sensors: Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.4

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2021-20199

CVSS v3

Risk Factor: Medium

Base Score: 5.9

Temporal Score: 5.3

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:rocky:linux:oci-seccomp-bpf-hook, p-cpe:/a:rocky:linux:criu-debuginfo, p-cpe:/a:rocky:linux:slirp4netns-debuginfo, p-cpe:/a:rocky:linux:podman-debugsource, p-cpe:/a:rocky:linux:podman-remote, p-cpe:/a:rocky:linux:libslirp-debuginfo, p-cpe:/a:rocky:linux:podman-debuginfo, p-cpe:/a:rocky:linux:toolbox, p-cpe:/a:rocky:linux:skopeo-debuginfo, p-cpe:/a:rocky:linux:conmon-debugsource, cpe:/o:rocky:linux:8, p-cpe:/a:rocky:linux:oci-seccomp-bpf-hook-debuginfo, p-cpe:/a:rocky:linux:podman-remote-debuginfo, p-cpe:/a:rocky:linux:skopeo, p-cpe:/a:rocky:linux:buildah-tests-debuginfo, p-cpe:/a:rocky:linux:slirp4netns, p-cpe:/a:rocky:linux:podman-catatonit-debuginfo, p-cpe:/a:rocky:linux:python3-criu, p-cpe:/a:rocky:linux:fuse-overlayfs-debuginfo, p-cpe:/a:rocky:linux:buildah-tests, p-cpe:/a:rocky:linux:containernetworking-plugins-debuginfo, p-cpe:/a:rocky:linux:skopeo-tests, p-cpe:/a:rocky:linux:podman, p-cpe:/a:rocky:linux:containernetworking-plugins-debugsource, p-cpe:/a:rocky:linux:libslirp-debugsource, p-cpe:/a:rocky:linux:podman-plugins-debuginfo, p-cpe:/a:rocky:linux:slirp4netns-debugsource, p-cpe:/a:rocky:linux:conmon, p-cpe:/a:rocky:linux:criu-debugsource, p-cpe:/a:rocky:linux:skopeo-debugsource, p-cpe:/a:rocky:linux:fuse-overlayfs-debugsource, p-cpe:/a:rocky:linux:containernetworking-plugins, p-cpe:/a:rocky:linux:buildah-debugsource, p-cpe:/a:rocky:linux:buildah, p-cpe:/a:rocky:linux:cockpit-podman, p-cpe:/a:rocky:linux:conmon-debuginfo, p-cpe:/a:rocky:linux:libslirp, p-cpe:/a:rocky:linux:podman-catatonit, p-cpe:/a:rocky:linux:crit, p-cpe:/a:rocky:linux:buildah-debuginfo, p-cpe:/a:rocky:linux:fuse-overlayfs, p-cpe:/a:rocky:linux:oci-seccomp-bpf-hook-debugsource, p-cpe:/a:rocky:linux:containers-common, p-cpe:/a:rocky:linux:podman-docker, p-cpe:/a:rocky:linux:libslirp-devel, p-cpe:/a:rocky:linux:podman-plugins, p-cpe:/a:rocky:linux:criu, p-cpe:/a:rocky:linux:udica, p-cpe:/a:rocky:linux:podman-tests, p-cpe:/a:rocky:linux:container-selinux

Required KB Items: Host/local_checks_enabled, Host/RockyLinux/release, Host/RockyLinux/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/18/2021

Vulnerability Publication Date: 12/17/2020

Reference Information

CVE: CVE-2020-29652, CVE-2021-20199

IAVB: 2023-B-0080-S