EulerOS Virtualization 2.10.0 libsepol (EulerOS-SA-2022-1405) vulnerabilitie
Reporter | Title | Published | Views | Family All 129 |
---|---|---|---|---|
![]() | Huawei EulerOS: Security Advisory for libsepol (EulerOS-SA-2022-1309) | 2 Mar 202200:00 | – | openvas |
![]() | Debian: Security Advisory (DLA-3930-1) | 22 Oct 202400:00 | – | openvas |
![]() | Huawei EulerOS: Security Advisory for libsepol (EulerOS-SA-2022-1257) | 26 Feb 202200:00 | – | openvas |
![]() | Huawei EulerOS: Security Advisory for libsepol (EulerOS-SA-2022-1293) | 2 Mar 202200:00 | – | openvas |
![]() | Huawei EulerOS: Security Advisory for libsepol (EulerOS-SA-2022-1405) | 13 Apr 202200:00 | – | openvas |
![]() | Fedora: Security Advisory for libsepol (FEDORA-2021-67efe88c29) | 16 Nov 202100:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-5391-1) | 28 Apr 202200:00 | – | openvas |
![]() | Huawei EulerOS: Security Advisory for libsepol (EulerOS-SA-2022-1245) | 26 Feb 202200:00 | – | openvas |
![]() | Huawei EulerOS: Security Advisory for libsepol (EulerOS-SA-2022-1379) | 13 Apr 202200:00 | – | openvas |
![]() | Huawei EulerOS: Security Advisory for libsepol (EulerOS-SA-2022-1174) | 24 Feb 202200:00 | – | openvas |
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(170502);
script_version("1.1");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/09/06");
script_cve_id(
"CVE-2021-36084",
"CVE-2021-36085",
"CVE-2021-36086",
"CVE-2021-36087"
);
script_name(english:"EulerOS Virtualization 2.10.0 : libsepol (EulerOS-SA-2022-1405)");
script_set_attribute(attribute:"synopsis", value:
"The remote EulerOS Virtualization host is missing multiple security updates.");
script_set_attribute(attribute:"description", value:
"According to the versions of the libsepol package installed, the EulerOS Virtualization installation on the remote host
is affected by the following vulnerabilities :
- The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from
__cil_verify_classpermission and __cil_pre_verify_helper). (CVE-2021-36084)
- The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from
__verify_map_perm_classperms and hashtab_map). (CVE-2021-36085)
- The CIL compiler in SELinux 3.2 has a use-after-free in cil_reset_classpermission (called from
cil_reset_classperms_set and cil_reset_classperms_list). (CVE-2021-36086)
- The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_match_any (called indirectly
from cil_check_neverallow). This occurs because there is sometimes a lack of checks for invalid statements
in an optional block. (CVE-2021-36087)
Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security
advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional
issues.");
# https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2022-1405
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?727dd40e");
script_set_attribute(attribute:"solution", value:
"Update the affected libsepol packages.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2021-36087");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2021/07/01");
script_set_attribute(attribute:"patch_publication_date", value:"2022/04/13");
script_set_attribute(attribute:"plugin_publication_date", value:"2023/01/24");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libsepol");
script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:uvp:2.10.0");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Huawei Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/uvp_version");
exit(0);
}
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var _release = get_kb_item("Host/EulerOS/release");
if (isnull(_release) || _release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
var uvp = get_kb_item("Host/EulerOS/uvp_version");
if (uvp != "2.10.0") audit(AUDIT_OS_NOT, "EulerOS Virtualization 2.10.0");
if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu && "x86" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "x86" >!< cpu) audit(AUDIT_ARCH_NOT, "i686 / x86_64", cpu);
var flag = 0;
var pkgs = [
"libsepol-3.1-1.h12.eulerosv2r10"
];
foreach (var pkg in pkgs)
if (rpm_check(release:"EulerOS-2.0", reference:pkg)) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_NOTE,
extra : rpm_report_get()
);
exit(0);
}
else
{
var tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libsepol");
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo