openSUSE Security Update : systemd (openSUSE-SU-2013:1528-1)

high Nessus Plugin ID 75158

Synopsis

The remote openSUSE host is missing a security update.

Description

This systemd update fixes several security and non-security issues.

- polkit-Avoid-race-condition-in-scraping-proc.patch:
VUL-0: polkit: process subject race condition (bnc#836932) CVE-2013-4288.

- Don't use a trigger to create symlink for sysctl.conf, always run the test on %post (bnc#840864).

- Move symlink migration trigger to post (bnc#821800).

- Add systemd-fix-crash-listing-session-files.patch (bnc#840055).

Solution

Update the affected systemd packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=821800

https://bugzilla.novell.com/show_bug.cgi?id=836932

https://bugzilla.novell.com/show_bug.cgi?id=840055

https://bugzilla.novell.com/show_bug.cgi?id=840864

https://lists.opensuse.org/opensuse-updates/2013-10/msg00005.html

Plugin Details

Severity: High

ID: 75158

File Name: openSUSE-2013-737.nasl

Version: 1.5

Type: local

Agent: unix

Published: 6/13/2014

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libgudev-1_0-0, p-cpe:/a:novell:opensuse:libgudev-1_0-0-32bit, p-cpe:/a:novell:opensuse:libgudev-1_0-0-debuginfo, p-cpe:/a:novell:opensuse:libgudev-1_0-0-debuginfo-32bit, p-cpe:/a:novell:opensuse:libgudev-1_0-devel, p-cpe:/a:novell:opensuse:libudev-devel, p-cpe:/a:novell:opensuse:libudev-mini-devel, p-cpe:/a:novell:opensuse:libudev-mini1, p-cpe:/a:novell:opensuse:libudev-mini1-debuginfo, p-cpe:/a:novell:opensuse:libudev1, p-cpe:/a:novell:opensuse:libudev1-32bit, p-cpe:/a:novell:opensuse:libudev1-debuginfo, p-cpe:/a:novell:opensuse:libudev1-debuginfo-32bit, p-cpe:/a:novell:opensuse:systemd, p-cpe:/a:novell:opensuse:systemd-32bit, p-cpe:/a:novell:opensuse:systemd-analyze, p-cpe:/a:novell:opensuse:systemd-debuginfo, p-cpe:/a:novell:opensuse:systemd-debuginfo-32bit, p-cpe:/a:novell:opensuse:systemd-debugsource, p-cpe:/a:novell:opensuse:systemd-devel, p-cpe:/a:novell:opensuse:systemd-logger, p-cpe:/a:novell:opensuse:systemd-mini, p-cpe:/a:novell:opensuse:systemd-mini-analyze, p-cpe:/a:novell:opensuse:systemd-mini-debuginfo, p-cpe:/a:novell:opensuse:systemd-mini-debugsource, p-cpe:/a:novell:opensuse:systemd-mini-devel, p-cpe:/a:novell:opensuse:systemd-mini-sysvinit, p-cpe:/a:novell:opensuse:systemd-sysvinit, p-cpe:/a:novell:opensuse:typelib-1_0-gudev-1_0, p-cpe:/a:novell:opensuse:udev, p-cpe:/a:novell:opensuse:udev-debuginfo, p-cpe:/a:novell:opensuse:udev-mini, p-cpe:/a:novell:opensuse:udev-mini-debuginfo, cpe:/o:novell:opensuse:12.3

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 9/27/2013

Reference Information

CVE: CVE-2013-4288

BID: 62511