Rocky Linux 8 : GNOME (RLSA-2021:1586)

high Nessus Plugin ID 157789

Synopsis

The remote Rocky Linux host is missing one or more security updates.

Description

The remote Rocky Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RLSA-2021:1586 advisory.

- A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-1817)

- A memory initialization issue was addressed with improved memory handling. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may result in the disclosure of process memory. (CVE-2021-1820)

- An input validation issue was addressed with improved input validation. This issue is fixed in iTunes 12.11.3 for Windows, iCloud for Windows 12.3, macOS Big Sur 11.3, Safari 14.1, watchOS 7.4, tvOS 14.5, iOS 14.5 and iPadOS 14.5. Processing maliciously crafted web content may lead to a cross site scripting attack. (CVE-2021-1825)

- A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to universal cross site scripting. (CVE-2021-1826)

- A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.1, iOS 12.5.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.. (CVE-2021-30661)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://errata.rockylinux.org/RLSA-2021:1586

https://bugzilla.redhat.com/show_bug.cgi?id=1152037

https://bugzilla.redhat.com/show_bug.cgi?id=1464902

https://bugzilla.redhat.com/show_bug.cgi?id=1671761

https://bugzilla.redhat.com/show_bug.cgi?id=1700002

https://bugzilla.redhat.com/show_bug.cgi?id=1705392

https://bugzilla.redhat.com/show_bug.cgi?id=1728632

https://bugzilla.redhat.com/show_bug.cgi?id=1728896

https://bugzilla.redhat.com/show_bug.cgi?id=1765627

https://bugzilla.redhat.com/show_bug.cgi?id=1786496

https://bugzilla.redhat.com/show_bug.cgi?id=1796916

https://bugzilla.redhat.com/show_bug.cgi?id=1802105

https://bugzilla.redhat.com/show_bug.cgi?id=1833787

https://bugzilla.redhat.com/show_bug.cgi?id=1842229

https://bugzilla.redhat.com/show_bug.cgi?id=1845660

https://bugzilla.redhat.com/show_bug.cgi?id=1846376

https://bugzilla.redhat.com/show_bug.cgi?id=1854290

https://bugzilla.redhat.com/show_bug.cgi?id=1860946

https://bugzilla.redhat.com/show_bug.cgi?id=1861357

https://bugzilla.redhat.com/show_bug.cgi?id=1861769

https://bugzilla.redhat.com/show_bug.cgi?id=1865718

https://bugzilla.redhat.com/show_bug.cgi?id=1870837

https://bugzilla.redhat.com/show_bug.cgi?id=1871041

https://bugzilla.redhat.com/show_bug.cgi?id=1876291

https://bugzilla.redhat.com/show_bug.cgi?id=1881312

https://bugzilla.redhat.com/show_bug.cgi?id=1883304

https://bugzilla.redhat.com/show_bug.cgi?id=1883868

https://bugzilla.redhat.com/show_bug.cgi?id=1886822

https://bugzilla.redhat.com/show_bug.cgi?id=1888407

https://bugzilla.redhat.com/show_bug.cgi?id=1889411

https://bugzilla.redhat.com/show_bug.cgi?id=1889528

https://bugzilla.redhat.com/show_bug.cgi?id=1901212

https://bugzilla.redhat.com/show_bug.cgi?id=1901214

https://bugzilla.redhat.com/show_bug.cgi?id=1901216

https://bugzilla.redhat.com/show_bug.cgi?id=1901221

https://bugzilla.redhat.com/show_bug.cgi?id=1903043

https://bugzilla.redhat.com/show_bug.cgi?id=1903568

https://bugzilla.redhat.com/show_bug.cgi?id=1906499

https://bugzilla.redhat.com/show_bug.cgi?id=1918391

https://bugzilla.redhat.com/show_bug.cgi?id=1919429

https://bugzilla.redhat.com/show_bug.cgi?id=1919432

https://bugzilla.redhat.com/show_bug.cgi?id=1919435

https://bugzilla.redhat.com/show_bug.cgi?id=1919467

https://bugzilla.redhat.com/show_bug.cgi?id=1921151

https://bugzilla.redhat.com/show_bug.cgi?id=837035

Plugin Details

Severity: High

ID: 157789

File Name: rocky_linux_RLSA-2021-1586.nasl

Version: 1.4

Type: local

Published: 2/9/2022

Updated: 3/8/2022

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.9

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: E:H/RL:OF/RC:C

CVSS Score Source: CVE-2021-30661

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 8.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: E:H/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:rocky:linux:webkit2gtk3, p-cpe:/a:rocky:linux:webkit2gtk3-debuginfo, p-cpe:/a:rocky:linux:webkit2gtk3-debugsource, p-cpe:/a:rocky:linux:webkit2gtk3-devel, p-cpe:/a:rocky:linux:webkit2gtk3-devel-debuginfo, p-cpe:/a:rocky:linux:webkit2gtk3-jsc, p-cpe:/a:rocky:linux:webkit2gtk3-jsc-debuginfo, p-cpe:/a:rocky:linux:webkit2gtk3-jsc-devel, p-cpe:/a:rocky:linux:webkit2gtk3-jsc-devel-debuginfo, cpe:/o:rocky:linux:8

Required KB Items: Host/local_checks_enabled, Host/RockyLinux/release, Host/RockyLinux/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/8/2021

Vulnerability Publication Date: 4/22/2021

CISA Known Exploited Dates: 11/17/2021

Reference Information

CVE: CVE-2021-1817, CVE-2021-1820, CVE-2021-1825, CVE-2021-1826, CVE-2021-30661

RLSA: 2021:1586

IAVA: 2021-A-0202-S