SB2019090205 - OpenSUSE Linux update for podman, slirp4netns and libcontainers-common
Published: September 2, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Path traversal (CVE-ID: CVE-2018-15664)
The vulnerability allows a local attacker to perform directory traversal attacks.
The vulnerability exists due to the API endpoints behind the 'docker cp' command are vulnerable to a symlink-exchange attack. A local authenticated attacker can gain read-write access to the host filesystem with root privileges, because "daemon/archive.go" does not do archive operations on a frozen filesystem (or from within a chroot).
2) Path traversal (CVE-ID: CVE-2019-10152)
The vulnerability allows a local attacker to perform directory traversal attacks.
The vulnerability exists due to the software does not properly resolve symlinks within containers. A local authenticated attacker who has compromised an existing container can cause arbitrary files on the host filesystem to be read/written when an administrator tries to copy a file from/to the container.
3) Heap-based buffer overflow (CVE-ID: CVE-2019-6778)
The vulnerability allows a local user to perform denial of service (DoS) attack.
The vulnerability exists due to a boundary error within the tcp_emu() function in slirp/tcp_subr.c. A local user can send specially crafted networking packets, trigger heap-based buffer overflow and crash the affected system.
Remediation
Install update from vendor's website.