AlmaLinux 8 : GNOME (ALSA-2021:1586)

high Nessus Plugin ID 157668

Synopsis

The remote AlmaLinux host is missing one or more security updates.

Description

The remote AlmaLinux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the ALSA-2021:1586 advisory.

- The keyfile settings backend in GNOME GLib (aka glib2.0) before 2.60.0 creates directories using g_file_make_directory_with_parents (kfsb->dir, NULL, NULL) and files using g_file_replace_contents (kfsb->file, contents, length, NULL, FALSE, G_FILE_CREATE_REPLACE_DESTINATION, NULL, NULL, NULL).
Consequently, it does not properly restrict directory (and file) permissions. Instead, for directories, 0777 permissions are used; for files, default file permissions are used. This is similar to CVE-2019-12450. (CVE-2019-13012)

- A type confusion issue was addressed with improved memory handling. This issue is fixed in Safari 14.0.
Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2020-9948)

- A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.0.
Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2020-9951)

- An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to code execution. (CVE-2020-9983)

- A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability. (CVE-2020-13543)

- An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.1 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in a remote code execution. The victim needs to visit a malicious web site to trigger this vulnerability. (CVE-2020-13584)

- gdm3 versions before 3.36.2 or 3.38.2 would start gnome-initial-setup if gdm3 can't contact the accountservice service via dbus in a timely manner; on Ubuntu (and potentially derivatives) this could be be chained with an additional issue that could allow a local user to create a new privileged account.
(CVE-2020-16125)

- A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-1817)

- A memory initialization issue was addressed with improved memory handling. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may result in the disclosure of process memory. (CVE-2021-1820)

- An input validation issue was addressed with improved input validation. This issue is fixed in iTunes 12.11.3 for Windows, iCloud for Windows 12.3, macOS Big Sur 11.3, Safari 14.1, watchOS 7.4, tvOS 14.5, iOS 14.5 and iPadOS 14.5. Processing maliciously crafted web content may lead to a cross site scripting attack. (CVE-2021-1825)

- A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to universal cross site scripting. (CVE-2021-1826)

- A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.1, iOS 12.5.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.. (CVE-2021-30661)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://errata.almalinux.org/8/ALSA-2021-1586.html

Plugin Details

Severity: High

ID: 157668

File Name: alma_linux_ALSA-2021-1586.nasl

Version: 1.5

Type: local

Published: 2/9/2022

Updated: 4/25/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2021-30661

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 8.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:alma:linux:glib2-tests, p-cpe:/a:alma:linux:glibmm24, p-cpe:/a:alma:linux:glibmm24-devel, p-cpe:/a:alma:linux:glibmm24-doc, p-cpe:/a:alma:linux:gnome-boxes, p-cpe:/a:alma:linux:gnome-photos, p-cpe:/a:alma:linux:gnome-photos-tests, p-cpe:/a:alma:linux:gnome-terminal, p-cpe:/a:alma:linux:gnome-terminal-nautilus, p-cpe:/a:alma:linux:gtk-doc, p-cpe:/a:alma:linux:gtk2, p-cpe:/a:alma:linux:libepubgen-devel, p-cpe:/a:alma:linux:libsass, p-cpe:/a:alma:linux:libsass-devel, p-cpe:/a:alma:linux:libsigc%2b%2b20, p-cpe:/a:alma:linux:libsigc%2b%2b20-devel, p-cpe:/a:alma:linux:libsigc%2b%2b20-doc, p-cpe:/a:alma:linux:libvisual, p-cpe:/a:alma:linux:libvisual-devel, p-cpe:/a:alma:linux:mutter-devel, p-cpe:/a:alma:linux:nautilus, p-cpe:/a:alma:linux:nautilus-devel, p-cpe:/a:alma:linux:nautilus-extensions, p-cpe:/a:alma:linux:pangomm, p-cpe:/a:alma:linux:pangomm-devel, p-cpe:/a:alma:linux:pangomm-doc, p-cpe:/a:alma:linux:soundtouch, p-cpe:/a:alma:linux:soundtouch-devel, p-cpe:/a:alma:linux:vala, p-cpe:/a:alma:linux:openexr-devel, p-cpe:/a:alma:linux:openexr-libs, p-cpe:/a:alma:linux:accountsservice-devel, p-cpe:/a:alma:linux:atkmm, p-cpe:/a:alma:linux:atkmm-devel, p-cpe:/a:alma:linux:atkmm-doc, p-cpe:/a:alma:linux:cairomm, p-cpe:/a:alma:linux:cairomm-devel, p-cpe:/a:alma:linux:cairomm-doc, p-cpe:/a:alma:linux:chrome-gnome-shell, p-cpe:/a:alma:linux:dleyna-core, p-cpe:/a:alma:linux:dleyna-server, p-cpe:/a:alma:linux:enchant2, p-cpe:/a:alma:linux:enchant2-devel, p-cpe:/a:alma:linux:gamin, p-cpe:/a:alma:linux:gamin-devel, p-cpe:/a:alma:linux:geoclue2, p-cpe:/a:alma:linux:geoclue2-demos, p-cpe:/a:alma:linux:geoclue2-devel, p-cpe:/a:alma:linux:geoclue2-libs, p-cpe:/a:alma:linux:geocode-glib, p-cpe:/a:alma:linux:geocode-glib-devel, p-cpe:/a:alma:linux:gjs, p-cpe:/a:alma:linux:gjs-devel, p-cpe:/a:alma:linux:glib2, p-cpe:/a:alma:linux:glib2-devel, p-cpe:/a:alma:linux:glib2-doc, p-cpe:/a:alma:linux:glib2-fam, p-cpe:/a:alma:linux:glib2-static, p-cpe:/a:alma:linux:gtk2-devel, p-cpe:/a:alma:linux:gtk2-devel-docs, p-cpe:/a:alma:linux:gtk2-immodule-xim, p-cpe:/a:alma:linux:gtk2-immodules, p-cpe:/a:alma:linux:gtkmm24, p-cpe:/a:alma:linux:gtkmm24-devel, p-cpe:/a:alma:linux:gtkmm24-docs, p-cpe:/a:alma:linux:gtkmm30, p-cpe:/a:alma:linux:gtkmm30-devel, p-cpe:/a:alma:linux:gtkmm30-doc, p-cpe:/a:alma:linux:gvfs, p-cpe:/a:alma:linux:gvfs-afc, p-cpe:/a:alma:linux:gvfs-afp, p-cpe:/a:alma:linux:gvfs-archive, p-cpe:/a:alma:linux:gvfs-client, p-cpe:/a:alma:linux:gvfs-devel, p-cpe:/a:alma:linux:gvfs-fuse, p-cpe:/a:alma:linux:gvfs-goa, p-cpe:/a:alma:linux:gvfs-gphoto2, p-cpe:/a:alma:linux:gvfs-mtp, p-cpe:/a:alma:linux:gvfs-smb, p-cpe:/a:alma:linux:libdazzle, p-cpe:/a:alma:linux:libdazzle-devel, p-cpe:/a:alma:linux:libepubgen, p-cpe:/a:alma:linux:vala-devel, p-cpe:/a:alma:linux:woff2, p-cpe:/a:alma:linux:woff2-devel, cpe:/o:alma:linux:8

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/AlmaLinux/release, Host/AlmaLinux/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/18/2021

Vulnerability Publication Date: 6/28/2019

CISA Known Exploited Vulnerability Due Dates: 11/17/2021

Reference Information

CVE: CVE-2019-13012, CVE-2020-13543, CVE-2020-13584, CVE-2020-16125, CVE-2020-9948, CVE-2020-9951, CVE-2020-9983, CVE-2021-1817, CVE-2021-1820, CVE-2021-1825, CVE-2021-1826, CVE-2021-30661

IAVA: 2021-A-0202-S