Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-15686 PoC — systemd 安全漏洞

Source
Associated Vulnerability
Title:systemd 安全漏洞 (CVE-2018-15686)
Description:systemd是德国软件开发者Lennart Poettering和其他人共同研发的一款基于Linux的系统和服务管理器,它兼容了SysV和LSB的启动脚本,且提供了一个用来表示系统服务间依赖关系的框架。 systemd 239及之前版本中的‘unit_deserialize’函数存在安全漏洞。攻击者可利用该漏洞影响systemd的正常运行并将权限提升至root。
Description
Remediation task for CVE-2018-15686, CVE-2018-16866, and CVE-2018-16888 affecting SystemD in EL7
Readme
# cesa_2019_2091

This module contains a [Bolt Task](https://puppet.com/docs/bolt/latest/bolt.html) that will remediate CVEs described in [CESA-2019:2091](https://lists.centos.org/pipermail/centos-cr-announce/2019-August/006149.html) and parallel issues present on other Enterprise Linux 7 (EL7) platforms. 

#### Table of Contents

1. [Description](#description)
2. [Setup - The basics of getting started with cesa_2019_2091](#setup)
    * [Beginning with cesa\_2019\_2091](#beginning-with-cesa_2019_2091)
3. [Usage - Configuration options and additional functionality](#usage)
4. [Limitations - OS compatibility, etc.](#limitations)
5. [Development - Guide for contributing to the module](#development)

## Description

This remediation addresses the following CVEs:

* [CVE-2018-15686]( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15686 )
* [CVE-2018-16866]( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16866 )
* [CVE-2018-16888]( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16888 )

Remediation is performed by using yum to updating key systemd packages to newer versions. Affected systemd RPM packages include:

* systemd
* systemd-libs
* systemd-sysv

## Setup


### Beginning with cesa\_2019\_2091

Using a Puppet file or other method, install in an appropriate place such that the task is visible to your task runner.

  **EXAMPLE** 
  
    $ bolt task show
    
	cesa_2019_2091::remediate   remediates CVE-2018-15686, CVE-2018-16866, and CVE-2018-16888
    


## Usage

Using your prefered method of running bolt tasks, run the task.

   **EXAMPLE**
   
   $ bolt task run cesa\_2019\_2091::remediate -n cent7-1,cent7-2,cent7-3


## Limitations

This remediation relies on yum, yum repositories, and related technologies to update RPM packages.

This remediation updates the relevant RPM packages to the latest available version without additional version checks. If your system remains vulnerable to these CVEs, it is likely sufficiently updated RPMs are **not** available in your yum repository as presntly configured.

This remediation targets the standard systemd packages most likely to be affected by these CVEs. Additional packages which may require attention are described in the relevant [CentOS-CR-announce mailing list announcement](https://lists.centos.org/pipermail/centos-cr-announce/2019-August/006149.html)


## Development

Pull requests welcome

## Release Notes

| Version | Notes                                                              |
| ------- | -------------------------------------------------------------------|
| 0.1.0   | Initial release                                                    |
|         |                                                                    |
File Snapshot

[4.0K] /data/pocs/fd7be4ac3ba80319e847b8198082b9cf51191955 ├── [1.3K] appveyor.yml ├── [4.0K] data │   └── [ 4] common.yaml ├── [3.4K] Gemfile ├── [ 268] hiera.yaml ├── [1.1K] metadata.json ├── [3.3K] Rakefile ├── [2.7K] README.md ├── [4.0K] spec │   ├── [ 217] default_facts.yml │   └── [1.6K] spec_helper.rb └── [4.0K] tasks ├── [ 112] remediate.json └── [ 61] remediate.sh 3 directories, 11 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.