SB2019090205 - OpenSUSE Linux update for podman, slirp4netns and libcontainers-common 



SB2019090205 - OpenSUSE Linux update for podman, slirp4netns and libcontainers-common

Published: September 2, 2019

Security Bulletin ID SB2019090205
Severity
Low
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Local access
Highest impact Data manipulation

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Path traversal (CVE-ID: CVE-2018-15664)

The vulnerability allows a local attacker to perform directory traversal attacks.

The vulnerability exists due to the API endpoints behind the 'docker cp' command are vulnerable to a symlink-exchange attack. A local authenticated attacker can gain read-write access to the host filesystem with root privileges, because "daemon/archive.go" does not do archive operations on a frozen filesystem (or from within a chroot).


2) Path traversal (CVE-ID: CVE-2019-10152)

The vulnerability allows a local attacker to perform directory traversal attacks.

The vulnerability exists due to the software does not properly resolve symlinks within containers. A local authenticated attacker who has compromised an existing container can cause arbitrary files on the host filesystem to be read/written when an administrator tries to copy a file from/to the container.



3) Heap-based buffer overflow (CVE-ID: CVE-2019-6778)

The vulnerability allows a local user to perform denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the tcp_emu() function in slirp/tcp_subr.c. A local user can send specially crafted networking packets, trigger heap-based buffer overflow and crash the affected system.


Remediation

Install update from vendor's website.