SUSE SLED15 / SLES15 Security Update : keylime (SUSE-SU-2022:2658-1)

critical Nessus Plugin ID 163818

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2022:2658-1 advisory.

- Keylime does not enforce that the agent registrar data is the same when the tenant uses it for validation of the EK and identity quote and the verifier for validating the integrity quote. This allows an attacker to use one AK, EK pair from a real TPM to pass EK validation and give the verifier an AK of a software TPM. A successful attack breaks the entire chain of trust because a not validated AK is used by the verifier. This issue is worse if the validation happens first and then the agent gets added to the verifier because the timing is easier and the verifier does not validate the regcount entry being equal to 1, (CVE-2022-1053)

- A UNIX Symbolic Link (Symlink) Following vulnerability in keylime of openSUSE Tumbleweed allows local attackers to escalate from the keylime user to root. This issue affects: openSUSE Tumbleweed keylime versions prior to 6.4.2-1.1. (CVE-2022-31250)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1199253

https://bugzilla.suse.com/1200885

https://bugzilla.suse.com/1201466

https://bugzilla.suse.com/1201866

https://www.suse.com/security/cve/CVE-2022-1053

https://www.suse.com/security/cve/CVE-2022-31250

http://www.nessus.org/u?a00c26a6

Plugin Details

Severity: Critical

ID: 163818

File Name: suse_SU-2022-2658-1.nasl

Version: 1.6

Type: local

Agent: unix

Published: 8/4/2022

Updated: 7/14/2023

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Temporal Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2022-1053

CVSS v3

Risk Factor: Critical

Base Score: 9.1

Temporal Score: 8.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:keylime-verifier, p-cpe:/a:novell:suse_linux:keylime-logrotate, p-cpe:/a:novell:suse_linux:python3-keylime, p-cpe:/a:novell:suse_linux:keylime-config, p-cpe:/a:novell:suse_linux:keylime-agent, p-cpe:/a:novell:suse_linux:keylime-registrar, p-cpe:/a:novell:suse_linux:keylime-tpm_cert_store, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:keylime-firewalld

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/3/2022

Vulnerability Publication Date: 5/6/2022

Reference Information

CVE: CVE-2022-1053, CVE-2022-31250

SuSE: SUSE-SU-2022:2658-1