Bug 13945

Summary: [CVE 21] subscription-manager 1.9.6 CVEs found
Product: [ROSA-based products] ROSA Fresh Reporter: Yury <y.tumanov>
Component: System (kernel, glibc, systemd, bash, PAM...)Assignee: ROSA Linux Bugs <bugs>
Status: RESOLVED DUPLICATE QA Contact: ROSA Linux Bugs <bugs>
Severity: critical    
Priority: Highest CC: e.kosachev, s.matveev, v.potapov, y.tumanov
Version: All   
Target Milestone: ---   
Hardware: All   
OS: Linux   
URL: CVE-2017-2663, CVE-2023-3899,
Whiteboard:
Platform: 2021.1 ROSA Vulnerability identifier:
RPM Package: ISO-related:
Bad POT generating: Upstream:

Description Yury 2023-10-18 20:31:27 MSK
Please patch CVEs for package subscription-manager version 1.9.6
  
INFO (CVEs are): subscription-manager 1.9.6
 cves found
CVE-2017-2663
Desc: It was found that subscription-manager's DBus interface before 1.19.4 let unprivileged user access the com.redhat.RHSM1.Facts.GetFacts and com.redhat.RHSM1.Config.Set methods. An unprivileged local attacker could use these methods to gain access to private information, or launch a privilege escalation attack.
Link: https://nvd.nist.gov/vuln/detail/CVE-2017-2663
Severity: HIGH
CVE-2023-3899
Desc: A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods to all users that could change the state of the registration. By using the com.redhat.RHSM1.Config.SetAll() method, a low-privileged local user could tamper with the state of the registration, by unregistering the system or by changing the current entitlements. This flaw allows an attacker to set arbitrary configuration directives for /etc/rhsm/rhsm.conf, which can be abused to cause a local privilege escalation to an unconfined root.
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-3899
Severity: HIGH
Comment 1 Vladimir Potapov 2023-10-20 11:41:58 MSK

*** This bug has been marked as a duplicate of bug 13813 ***