SB2019042603 - OpenSUSE Linux update for lxc
Published: April 26, 2019 Updated: January 23, 2023
Security Bulletin ID
SB2019042603
Severity
Medium
Patch available
YES
Number of vulnerabilities
2
Exploitation vector
Local access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Information disclosure (CVE-ID: CVE-2018-6556)
The vulnerability allows a local unauthenticated attacker to obtain potentially sensitive information on the target system.The weakness exists due to lxc-user-nic unconditionally opens a user provided path when asked to delete a network interface. A local attacker can check for the existence of a path which he wouldn't otherwise be able to reach and trigger side effects by causing a (read-only) open of special kernel files (ptmx, proc, sys).
2) Privilege escalation (CVE-ID: CVE-2019-5736)
The vulnerability allows a remote attacker to gain elevated privileges.The weakness exists in the runc container runtime due to file-descriptor mishandling, related to /proc/self/exe. A remote attacker can leverage the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec, overwrite the host runc binary with minimal user interaction and execute arbitrary code with root privileges.
Successful exploitation of the vulnerability may result in system compromise.
Remediation
Install update from vendor's website.