Rocky Linux 8 : systemd (RLSA-2021:1611)

high Nessus Plugin ID 184771

Synopsis

The remote Rocky Linux host is missing one or more security updates.

Description

The remote Rocky Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RLSA-2021:1611 advisory.

- In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the allow_active element rather than allow_any. (CVE-2019-3842)

- systemd through v245 mishandles numerical usernames such as ones composed of decimal digits or 0x followed by hex digits, as demonstrated by use of root privileges when privileges of the 0x0 user account were intended. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000082. (CVE-2020-13776)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://errata.rockylinux.org/RLSA-2021:1611

https://bugzilla.redhat.com/show_bug.cgi?id=1668521

https://bugzilla.redhat.com/show_bug.cgi?id=1740657

https://bugzilla.redhat.com/show_bug.cgi?id=1755287

https://bugzilla.redhat.com/show_bug.cgi?id=1764282

https://bugzilla.redhat.com/show_bug.cgi?id=1812972

https://bugzilla.redhat.com/show_bug.cgi?id=1819868

https://bugzilla.redhat.com/show_bug.cgi?id=1845534

https://bugzilla.redhat.com/show_bug.cgi?id=1862714

https://bugzilla.redhat.com/show_bug.cgi?id=1865840

https://bugzilla.redhat.com/show_bug.cgi?id=1868831

https://bugzilla.redhat.com/show_bug.cgi?id=1868877

https://bugzilla.redhat.com/show_bug.cgi?id=1870638

https://bugzilla.redhat.com/show_bug.cgi?id=1871139

https://bugzilla.redhat.com/show_bug.cgi?id=1880270

https://bugzilla.redhat.com/show_bug.cgi?id=1885553

https://bugzilla.redhat.com/show_bug.cgi?id=1887181

https://bugzilla.redhat.com/show_bug.cgi?id=1888912

https://bugzilla.redhat.com/show_bug.cgi?id=1889996

Plugin Details

Severity: High

ID: 184771

File Name: rocky_linux_RLSA-2021-1611.nasl

Version: 1.2

Type: local

Published: 11/6/2023

Updated: 12/22/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.2

Temporal Score: 4.9

Vector: CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2020-13776

CVSS v3

Risk Factor: High

Base Score: 7

Temporal Score: 6.3

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2019-3842

Vulnerability Information

CPE: p-cpe:/a:rocky:linux:systemd, p-cpe:/a:rocky:linux:systemd-container, p-cpe:/a:rocky:linux:systemd-container-debuginfo, p-cpe:/a:rocky:linux:systemd-debuginfo, p-cpe:/a:rocky:linux:systemd-debugsource, p-cpe:/a:rocky:linux:systemd-devel, p-cpe:/a:rocky:linux:systemd-journal-remote, p-cpe:/a:rocky:linux:systemd-journal-remote-debuginfo, p-cpe:/a:rocky:linux:systemd-libs, p-cpe:/a:rocky:linux:systemd-libs-debuginfo, p-cpe:/a:rocky:linux:systemd-pam, p-cpe:/a:rocky:linux:systemd-pam-debuginfo, p-cpe:/a:rocky:linux:systemd-tests, p-cpe:/a:rocky:linux:systemd-tests-debuginfo, p-cpe:/a:rocky:linux:systemd-udev, p-cpe:/a:rocky:linux:systemd-udev-debuginfo, cpe:/o:rocky:linux:8

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RockyLinux/release, Host/RockyLinux/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/18/2021

Vulnerability Publication Date: 4/9/2019

Reference Information

CVE: CVE-2019-3842, CVE-2020-13776