= Required Actions
== Kubernetes & etcd (Security fixes)
This fix involves an upgrade of Kubernetes and some add-ons. See https://documentation.suse.com/suse-caasp/4.2/html/caasp-admin/_cluste r_upd ates.html#_updating_kubernetes_components for the upgrade procedure.
== Skuba & helm/helm3
In order to update skuba and helm or helm 3, you need to update the management workstation. See detailed instructions at https://documentation.suse.com/suse-caasp/4.2/html/caasp-admin/_cluste r_upd ates.html#_update_management_workstation
= Known Issues
Modifying the file /etc/sysconfig/kubelet
directly is not supported:
documentation at https://documentation.suse.com/suse-caasp/4.2/html/caasp-admin/_miscel laneo us.html#_configuring_kubelet
Be sure to check the Release Notes at https://www.suse.com/releasenotes/x86_64/SUSE-CAASP/4/#_changes_in_4_2
_4 for any additional known issues or behavioral changes.
Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from SUSE update advisory SUSE-SU-2020:3760-1.
# The text itself is copyright (C) SUSE.
#
include('compat.inc');
if (description)
{
script_id(144173);
script_version("1.3");
script_set_attribute(attribute:"plugin_modification_date", value:"2022/05/11");
script_cve_id(
"CVE-2020-8565",
"CVE-2020-8566",
"CVE-2020-15106",
"CVE-2020-15112",
"CVE-2020-15184",
"CVE-2020-15185",
"CVE-2020-15186",
"CVE-2020-15187"
);
script_name(english:"SUSE SLES15 Security Update : Security changes in Kubernetes, etcd, / helm; Bugfix in cri-o package (SUSE-SU-2020:3760-1)");
script_set_attribute(attribute:"synopsis", value:
"The remote SUSE host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"= Required Actions
== Kubernetes & etcd (Security fixes)
This fix involves an upgrade of Kubernetes and some add-ons. See
https://documentation.suse.com/suse-caasp/4.2/html/caasp-admin/_cluste
r_upd ates.html#_updating_kubernetes_components for the upgrade
procedure.
== Skuba & helm/helm3
In order to update skuba and helm or helm 3, you need to update the
management workstation. See detailed instructions at
https://documentation.suse.com/suse-caasp/4.2/html/caasp-admin/_cluste
r_upd ates.html#_update_management_workstation
= Known Issues
Modifying the file `/etc/sysconfig/kubelet` directly is not supported:
documentation at
https://documentation.suse.com/suse-caasp/4.2/html/caasp-admin/_miscel
laneo us.html#_configuring_kubelet
Be sure to check the Release Notes at
https://www.suse.com/releasenotes/x86_64/SUSE-CAASP/4/#_changes_in_4_2
_4 for any additional known issues or behavioral changes.
Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1174219");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1174951");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1176752");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1176753");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1176754");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1176755");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1177661");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1177662");
# https://documentation.suse.com/suse-caasp/4.2/html/caasp-admin/_cluster_upd
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?146bfaa7");
# https://documentation.suse.com/suse-caasp/4.2/html/caasp-admin/_miscellaneo
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?1d257dec");
# https://www.suse.com/releasenotes/x86_64/SUSE-CAASP/4/#_changes_in_4_2_4
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?a9513140");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-15106/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-15112/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-15184/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-15185/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-15186/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-15187/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-8565/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-8566/");
# https://www.suse.com/support/update/announcement/2020/suse-su-20203760-1
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?1385e4bd");
script_set_attribute(attribute:"solution", value:
"To install this SUSE Security Update use the SUSE recommended
installation methods like YaST online_update or 'zypper patch'.
Alternatively you can run the command listed for your product :
SUSE Linux Enterprise Module for Containers 15-SP1 :
zypper in -t patch SUSE-SLE-Module-Containers-15-SP1-2020-3760=1
SUSE CaaS Platform 4.0 :
To install this update, use the SUSE CaaS Platform 'skuba' tool. I
will inform you if it detects new updates and let you then trigger
updating of the complete cluster in a controlled way.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-15187");
script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2020-8566");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"vuln_publication_date", value:"2020/08/05");
script_set_attribute(attribute:"patch_publication_date", value:"2020/12/11");
script_set_attribute(attribute:"plugin_publication_date", value:"2020/12/14");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kubernetes-client");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kubernetes-common");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:15");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"SuSE Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE");
os_ver = os_ver[1];
if (! preg(pattern:"^(SLES15)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLES15", "SUSE " + os_ver);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu);
if (cpu >!< "x86_64") audit(AUDIT_ARCH_NOT, "x86_64", cpu);
sp = get_kb_item("Host/SuSE/patchlevel");
if (isnull(sp)) sp = "0";
if (os_ver == "SLES15" && (! preg(pattern:"^(1)$", string:sp))) audit(AUDIT_OS_NOT, "SLES15 SP1", os_ver + " SP" + sp);
flag = 0;
if (rpm_check(release:"SLES15", sp:"1", cpu:"x86_64", reference:"kubernetes-client-1.17.13-4.21.2")) flag++;
if (rpm_check(release:"SLES15", sp:"1", cpu:"x86_64", reference:"kubernetes-common-1.17.13-4.21.2")) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
else security_warning(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Security changes in Kubernetes / etcd / / helm; Bugfix in cri-o package");
}
Vendor | Product | Version | CPE |
---|---|---|---|
novell | suse_linux | kubernetes-client | p-cpe:/a:novell:suse_linux:kubernetes-client |
novell | suse_linux | kubernetes-common | p-cpe:/a:novell:suse_linux:kubernetes-common |
novell | suse_linux | 15 | cpe:/o:novell:suse_linux:15 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15106
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15112
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15184
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15185
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15186
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15187
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8565
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8566
www.nessus.org/u?1385e4bd
www.nessus.org/u?146bfaa7
www.nessus.org/u?1d257dec
www.nessus.org/u?a9513140
bugzilla.suse.com/show_bug.cgi?id=1174219
bugzilla.suse.com/show_bug.cgi?id=1174951
bugzilla.suse.com/show_bug.cgi?id=1176752
bugzilla.suse.com/show_bug.cgi?id=1176753
bugzilla.suse.com/show_bug.cgi?id=1176754
bugzilla.suse.com/show_bug.cgi?id=1176755
bugzilla.suse.com/show_bug.cgi?id=1177661
bugzilla.suse.com/show_bug.cgi?id=1177662
www.suse.com/security/cve/CVE-2020-15106/
www.suse.com/security/cve/CVE-2020-15112/
www.suse.com/security/cve/CVE-2020-15184/
www.suse.com/security/cve/CVE-2020-15185/
www.suse.com/security/cve/CVE-2020-15186/
www.suse.com/security/cve/CVE-2020-15187/
www.suse.com/security/cve/CVE-2020-8565/
www.suse.com/security/cve/CVE-2020-8566/