RHEL 8:OpenShift 容器平台 4.11.0 套件和 (RHSA-2022: 5068)

critical Nessus Plugin ID 164846

概要

遠端 Red Hat 主機缺少一個或多個安全性更新。

說明

遠端 Redhat Enterprise Linux 8 主機上安裝的套件受到 RHSA-2022: 5068 公告中提及的多個弱點影響。

- golang.org/x/crypto:空白純文字封包可導致錯誤 (CVE-2021-43565)

- ignition:可從 VMware 產品上執行的 VM 中的無權限容器存取組態 (CVE-2022-1706)

- prometheus/client_golang:使用 InstrumentHandlerCounter 的拒絕服務 (CVE-2022-21698)

- golang:math/big:不受控制的記憶體消耗是透過 Rat.SetString 造成的未處理溢位所致 (CVE-2022-23772)

- golang:使用 cgo 的 cmd/go: 分支名稱誤解可導致不正確存取控制 (CVE-2022-23773)

- golang:crypto/elliptic:IsOnCurve 為無效欄位元素傳回 true (CVE-2022-23806)

- golang:編碼/pem:修正 Decode 中的堆疊溢位 (CVE-2022-24675)

- golang:regexp:透過深度巢狀運算式造成堆疊耗盡 (CVE-2022-24921)

- golang:golang.org/x/crypto/ssh 伺服器當機 (CVE-2022-27191)

- golang:crypto/elliptic:過大的純量造成的錯誤 (CVE-2022-28327)

- runc:未正確處理可繼承的功能 (CVE-2022-29162)

請注意,Nessus 並未測試這些問題,而是僅依據應用程式自我報告的版本號碼作出判斷。

解決方案

更新受影響的套件。

另請參閱

https://bugzilla.redhat.com/2064857

https://bugzilla.redhat.com/2077688

https://bugzilla.redhat.com/2077689

https://bugzilla.redhat.com/2082274

https://bugzilla.redhat.com/2086398

https://access.redhat.com/security/cve/CVE-2021-43565

https://access.redhat.com/security/cve/CVE-2022-1706

https://access.redhat.com/security/cve/CVE-2022-21698

https://access.redhat.com/security/cve/CVE-2022-23772

https://access.redhat.com/security/cve/CVE-2022-23773

https://access.redhat.com/security/cve/CVE-2022-23806

https://access.redhat.com/security/cve/CVE-2022-24675

https://access.redhat.com/security/cve/CVE-2022-24921

https://access.redhat.com/security/cve/CVE-2022-27191

https://access.redhat.com/security/cve/CVE-2022-28327

https://access.redhat.com/security/cve/CVE-2022-29162

https://access.redhat.com/errata/RHSA-2022:5068

https://bugzilla.redhat.com/2030787

https://bugzilla.redhat.com/2045880

https://bugzilla.redhat.com/2053429

https://bugzilla.redhat.com/2053532

https://bugzilla.redhat.com/2053541

https://bugzilla.redhat.com/2064702

Plugin 詳細資訊

嚴重性: Critical

ID: 164846

檔案名稱: redhat-RHSA-2022-5068.nasl

版本: 1.7

類型: local

代理程式: unix

已發布: 2022/9/8

已更新: 2023/10/12

支援的感應器: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

風險資訊

VPR

風險因素: Medium

分數: 6.7

CVSS v2

風險因素: Medium

基本分數: 6.4

時間分數: 5

媒介: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:P

CVSS 評分資料來源: CVE-2022-23806

CVSS v3

風險因素: Critical

基本分數: 9.1

時間分數: 8.2

媒介: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

時間媒介: CVSS:3.0/E:P/RL:O/RC:C

弱點資訊

CPE: cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:redhat:enterprise_linux:buildah, p-cpe:/a:redhat:enterprise_linux:buildah-tests, p-cpe:/a:redhat:enterprise_linux:butane, p-cpe:/a:redhat:enterprise_linux:butane-redistributable, p-cpe:/a:redhat:enterprise_linux:containernetworking-plugins, p-cpe:/a:redhat:enterprise_linux:cri-o, p-cpe:/a:redhat:enterprise_linux:ignition, p-cpe:/a:redhat:enterprise_linux:ignition-validate, p-cpe:/a:redhat:enterprise_linux:openshift-clients, p-cpe:/a:redhat:enterprise_linux:openshift-clients-redistributable, p-cpe:/a:redhat:enterprise_linux:openshift-hyperkube, p-cpe:/a:redhat:enterprise_linux:podman, p-cpe:/a:redhat:enterprise_linux:podman-catatonit, p-cpe:/a:redhat:enterprise_linux:podman-docker, p-cpe:/a:redhat:enterprise_linux:podman-plugins, p-cpe:/a:redhat:enterprise_linux:podman-remote, p-cpe:/a:redhat:enterprise_linux:podman-tests, p-cpe:/a:redhat:enterprise_linux:runc, p-cpe:/a:redhat:enterprise_linux:skopeo, p-cpe:/a:redhat:enterprise_linux:skopeo-tests

必要的 KB 項目: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

可被惡意程式利用: true

可輕鬆利用: Exploits are available

修補程式發佈日期: 2022/8/10

弱點發布日期: 2022/2/11

參考資訊

CVE: CVE-2022-1706, CVE-2022-21698, CVE-2022-23772, CVE-2022-23773, CVE-2022-23806, CVE-2022-24675, CVE-2022-24921, CVE-2022-27191, CVE-2022-28327, CVE-2022-29162

CWE: 120, 1220, 190, 20, 200, 252, 276, 327, 400, 772, 863

RHSA: 2022:5068