Lucene search

K
nessusThis script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.OPENSUSE-2016-488.NASL
HistoryApr 20, 2016 - 12:00 a.m.

openSUSE Security Update : systemd (openSUSE-2016-488)

2016-04-2000:00:00
This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
7

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

3.3 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

0.0004 Low

EPSS

Percentile

5.1%

This update for systemd fixes several issues :

e5e362a udev: exclude MD from block device ownership event locking 8839413 udev: really exclude device-mapper from block device ownership event locking 66782e6 udev: exclude device-mapper from block device ownership event locking (bsc#972727) 1386f57 tmpfiles: explicitly set mode for /run/log faadb74 tmpfiles: don’t allow read access to journal files to users not in systemd-journal 9b1ef37 tmpfiles: don’t apply sgid and executable bit to journal files, only the directories they are contained in 011c39f tmpfiles: add ability to mask access mode by pre-existing access mode on files/directories 07e2d60 tmpfiles: get rid of ‘m’ lines d504e28 tmpfiles: various modernizations f97250d systemctl: no need to pass --all if inactive is explicitly requested in list-units (bsc#967122) 2686573 fstab-generator: fix automount option and don’t start associated mount unit at boot (bsc#970423) 5c1637d login: support more than just power-gpio-key (fate#318444) (bsc#970860) 2c95ecd logind: add standard gpio power button support (fate#318444) (bsc#970860) af3eb93 Revert ‘log-target-null-instead-kmsg’ 555dad4 shorten hostname before checking for trailing dot (bsc#965897) 522194c Revert ‘log: honour the kernel’s quiet cmdline argument’ (bsc#963230) cc94e47 transaction:
downgrade warnings about wanted unit which are not found (bsc#960158) eb3cfb3 Revert ‘vhangup-on-all-consoles’ 0c28752 remove WorkingDirectory parameter from emergency, rescue and console-shell.service (bsc#959886)

  • Don’t allow read access to journal files to users (boo#972612 CVE-2014-9770 CVE-2015-8842) Remove the world read bit from the permissions of (persistent) archived journals. This was incorrectly set due to backported commit 18afa5c2a7a6c215. For the same reasons we also have to fix the permissions of /run/log/journal/<machine-id> directory to make sure that regular user won’t access to its content.

  • spec: remove libudev1 runtime dependencies on udev

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from openSUSE Security Update openSUSE-2016-488.
#
# The text description of this plugin is (C) SUSE LLC.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(90594);
  script_version("2.6");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");

  script_cve_id("CVE-2014-9770", "CVE-2015-8842");

  script_name(english:"openSUSE Security Update : systemd (openSUSE-2016-488)");
  script_summary(english:"Check for the openSUSE-2016-488 patch");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote openSUSE host is missing a security update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"This update for systemd fixes several issues :

e5e362a udev: exclude MD from block device ownership event locking
8839413 udev: really exclude device-mapper from block device ownership
event locking 66782e6 udev: exclude device-mapper from block device
ownership event locking (bsc#972727) 1386f57 tmpfiles: explicitly set
mode for /run/log faadb74 tmpfiles: don't allow read access to journal
files to users not in systemd-journal 9b1ef37 tmpfiles: don't apply
sgid and executable bit to journal files, only the directories they
are contained in 011c39f tmpfiles: add ability to mask access mode by
pre-existing access mode on files/directories 07e2d60 tmpfiles: get
rid of 'm' lines d504e28 tmpfiles: various modernizations f97250d
systemctl: no need to pass --all if inactive is explicitly requested
in list-units (bsc#967122) 2686573 fstab-generator: fix automount
option and don't start associated mount unit at boot (bsc#970423)
5c1637d login: support more than just power-gpio-key (fate#318444)
(bsc#970860) 2c95ecd logind: add standard gpio power button support
(fate#318444) (bsc#970860) af3eb93 Revert
'log-target-null-instead-kmsg' 555dad4 shorten hostname before
checking for trailing dot (bsc#965897) 522194c Revert 'log: honour the
kernel's quiet cmdline argument' (bsc#963230) cc94e47 transaction:
downgrade warnings about wanted unit which are not found (bsc#960158)
eb3cfb3 Revert 'vhangup-on-all-consoles' 0c28752 remove
WorkingDirectory parameter from emergency, rescue and
console-shell.service (bsc#959886)

  - Don't allow read access to journal files to users
    (boo#972612 CVE-2014-9770 CVE-2015-8842) Remove the
    world read bit from the permissions of (persistent)
    archived journals. This was incorrectly set due to
    backported commit 18afa5c2a7a6c215. For the same reasons
    we also have to fix the permissions of
    /run/log/journal/<machine-id> directory to make sure
    that regular user won't access to its content.

  - spec: remove libudev1 runtime dependencies on udev"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.opensuse.org/show_bug.cgi?id=959886"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.opensuse.org/show_bug.cgi?id=960158"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.opensuse.org/show_bug.cgi?id=963230"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.opensuse.org/show_bug.cgi?id=965897"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.opensuse.org/show_bug.cgi?id=967122"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.opensuse.org/show_bug.cgi?id=970423"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.opensuse.org/show_bug.cgi?id=970860"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.opensuse.org/show_bug.cgi?id=972612"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.opensuse.org/show_bug.cgi?id=972727"
  );
  # https://features.opensuse.org/318444
  script_set_attribute(
    attribute:"see_also",
    value:"https://features.opensuse.org/"
  );
  script_set_attribute(
    attribute:"solution", 
    value:"Update the affected systemd packages."
  );
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libgudev-1_0-0");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libgudev-1_0-0-32bit");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libgudev-1_0-0-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libgudev-1_0-0-debuginfo-32bit");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libgudev-1_0-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libudev-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libudev-mini-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libudev-mini1");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libudev-mini1-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libudev1");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libudev1-32bit");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libudev1-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libudev1-debuginfo-32bit");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:nss-myhostname");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:nss-myhostname-32bit");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:nss-myhostname-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:nss-myhostname-debuginfo-32bit");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:systemd");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:systemd-32bit");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:systemd-bash-completion");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:systemd-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:systemd-debuginfo-32bit");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:systemd-debugsource");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:systemd-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:systemd-journal-gateway");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:systemd-journal-gateway-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:systemd-logger");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:systemd-mini");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:systemd-mini-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:systemd-mini-debugsource");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:systemd-mini-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:systemd-mini-sysvinit");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:systemd-sysvinit");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:typelib-1_0-GUdev-1_0");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:udev");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:udev-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:udev-mini");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:udev-mini-debuginfo");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:13.1");

  script_set_attribute(attribute:"patch_publication_date", value:"2016/04/19");
  script_set_attribute(attribute:"plugin_publication_date", value:"2016/04/20");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"SuSE Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
if (release !~ "^(SUSE13\.1)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "13.1", release);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

ourarch = get_kb_item("Host/cpu");
if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);

flag = 0;

if ( rpm_check(release:"SUSE13.1", reference:"libgudev-1_0-0-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"libgudev-1_0-0-debuginfo-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"libgudev-1_0-devel-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"libudev-devel-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"libudev-mini-devel-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"libudev-mini1-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"libudev-mini1-debuginfo-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"libudev1-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"libudev1-debuginfo-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"nss-myhostname-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"nss-myhostname-debuginfo-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"systemd-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"systemd-bash-completion-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"systemd-debuginfo-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"systemd-debugsource-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"systemd-devel-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"systemd-journal-gateway-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"systemd-journal-gateway-debuginfo-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"systemd-logger-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"systemd-mini-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"systemd-mini-debuginfo-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"systemd-mini-debugsource-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"systemd-mini-devel-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"systemd-mini-sysvinit-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"systemd-sysvinit-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"typelib-1_0-GUdev-1_0-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"udev-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"udev-debuginfo-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"udev-mini-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"udev-mini-debuginfo-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", cpu:"x86_64", reference:"libgudev-1_0-0-32bit-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", cpu:"x86_64", reference:"libgudev-1_0-0-debuginfo-32bit-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", cpu:"x86_64", reference:"libudev1-32bit-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", cpu:"x86_64", reference:"libudev1-debuginfo-32bit-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", cpu:"x86_64", reference:"nss-myhostname-32bit-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", cpu:"x86_64", reference:"nss-myhostname-debuginfo-32bit-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", cpu:"x86_64", reference:"systemd-32bit-210-46.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", cpu:"x86_64", reference:"systemd-debuginfo-32bit-210-46.1") ) flag++;

if (flag)
{
  if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());
  else security_note(0);
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libudev-mini-devel / libudev-mini1 / libudev-mini1-debuginfo / etc");
}
VendorProductVersionCPE
novellopensuselibudev-mini1p-cpe:/a:novell:opensuse:libudev-mini1
novellopensuselibudev-mini1-debuginfop-cpe:/a:novell:opensuse:libudev-mini1-debuginfo
novellopensuselibgudev-1_0-0p-cpe:/a:novell:opensuse:libgudev-1_0-0
novellopensuselibgudev-1_0-0-32bitp-cpe:/a:novell:opensuse:libgudev-1_0-0-32bit
novellopensuselibgudev-1_0-0-debuginfop-cpe:/a:novell:opensuse:libgudev-1_0-0-debuginfo
novellopensuselibgudev-1_0-0-debuginfo-32bitp-cpe:/a:novell:opensuse:libgudev-1_0-0-debuginfo-32bit
novellopensuselibgudev-1_0-develp-cpe:/a:novell:opensuse:libgudev-1_0-devel
novellopensuselibudev-develp-cpe:/a:novell:opensuse:libudev-devel
novellopensuselibudev-mini-develp-cpe:/a:novell:opensuse:libudev-mini-devel
novellopensuselibudev1p-cpe:/a:novell:opensuse:libudev1
Rows per page:
1-10 of 391

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

3.3 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

0.0004 Low

EPSS

Percentile

5.1%