RHEL 8 : virt:8.2 and virt-devel:8.2 (RHSA-2021:3704)

high Nessus Plugin ID 153804
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2021:3704 advisory.

- ntfs-3g: Out-of-bounds heap buffer access in ntfs_get_attribute_value() due to incorrect check of bytes_in_use value in MFT records (CVE-2021-33285)

- ntfs-3g: Heap buffer overflow triggered by a specially crafted Unicode string (CVE-2021-33286)

- ntfs-3g: Heap buffer overflow in ntfs_attr_pread_i() triggered by specially crafted NTFS attributes (CVE-2021-33287)

- ntfs-3g: Heap buffer overflow triggered by a specially crafted MFT section (CVE-2021-33289)

- ntfs-3g: Heap buffer overflow triggered by a specially crafted NTFS inode pathname (CVE-2021-35266)

- ntfs-3g: Stack buffer overflow triggered when correcting differences between MFT and MFTMirror sections (CVE-2021-35267)

- ntfs-3g: Heap buffer overflow in ntfs_inode_real_open() triggered by a specially crafted NTFS inode (CVE-2021-35268)

- ntfs-3g: Heap buffer overflow in ntfs_attr_setup_flag() triggered by a specially crafted NTFS attribute from MFT (CVE-2021-35269)

- libvirt: Insecure sVirt label generation (CVE-2021-3631)

- libvirt: Improper locking on ACL failure in virStoragePoolLookupByTargetPath API (CVE-2021-3667)

- QEMU: usbredir: free() call on invalid pointer in bufp_alloc() (CVE-2021-3682)

- ntfs-3g: NULL pointer dereference in ntfs_extent_inode_open() (CVE-2021-39251)

- ntfs-3g: Out-of-bounds read in ntfs_ie_lookup() (CVE-2021-39252)

- ntfs-3g: Out-of-bounds read in ntfs_runlists_merge_i() (CVE-2021-39253)

- ntfs-3g: Integer overflow in memmove() leading to heap buffer overflow in ntfs_attr_record_resize() (CVE-2021-39254)

- ntfs-3g: Out-of-bounds read ntfs_attr_find_in_attrdef() triggered by an invalid attribute (CVE-2021-39255)

- ntfs-3g: Heap buffer overflow in ntfs_inode_lookup_by_name() (CVE-2021-39256)

- ntfs-3g: Endless recursion from ntfs_attr_pwrite() triggered by an unallocated bitmap (CVE-2021-39257)

- ntfs-3g: Out-of-bounds reads in ntfs_attr_find() and ntfs_external_attr_find() (CVE-2021-39258)

- ntfs-3g: Out-of-bounds access in ntfs_inode_lookup_by_name() caused by an unsanitized attribute length (CVE-2021-39259)

- ntfs-3g: Out-of-bounds access in ntfs_inode_sync_standard_information() (CVE-2021-39260)

- ntfs-3g: Heap buffer overflow in ntfs_compressed_pwrite() (CVE-2021-39261)

- ntfs-3g: Out-of-bounds access in ntfs_decompress() (CVE-2021-39262)

- ntfs-3g: Heap buffer overflow in ntfs_get_attribute_value() caused by an unsanitized attribute (CVE-2021-39263)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://cwe.mitre.org/data/definitions/119.html

https://cwe.mitre.org/data/definitions/667.html

https://cwe.mitre.org/data/definitions/732.html

https://cwe.mitre.org/data/definitions/763.html

https://access.redhat.com/security/cve/CVE-2021-3631

https://access.redhat.com/security/cve/CVE-2021-3667

https://access.redhat.com/security/cve/CVE-2021-3682

https://access.redhat.com/security/cve/CVE-2021-33285

https://access.redhat.com/security/cve/CVE-2021-33286

https://access.redhat.com/security/cve/CVE-2021-33287

https://access.redhat.com/security/cve/CVE-2021-33289

https://access.redhat.com/security/cve/CVE-2021-35266

https://access.redhat.com/security/cve/CVE-2021-35267

https://access.redhat.com/security/cve/CVE-2021-35268

https://access.redhat.com/security/cve/CVE-2021-35269

https://access.redhat.com/security/cve/CVE-2021-39251

https://access.redhat.com/security/cve/CVE-2021-39252

https://access.redhat.com/security/cve/CVE-2021-39253

https://access.redhat.com/security/cve/CVE-2021-39254

https://access.redhat.com/security/cve/CVE-2021-39255

https://access.redhat.com/security/cve/CVE-2021-39256

https://access.redhat.com/security/cve/CVE-2021-39257

https://access.redhat.com/security/cve/CVE-2021-39258

https://access.redhat.com/security/cve/CVE-2021-39259

https://access.redhat.com/security/cve/CVE-2021-39260

https://access.redhat.com/security/cve/CVE-2021-39261

https://access.redhat.com/security/cve/CVE-2021-39262

https://access.redhat.com/security/cve/CVE-2021-39263

https://access.redhat.com/errata/RHSA-2021:3704

https://bugzilla.redhat.com/1977726

https://bugzilla.redhat.com/1986094

https://bugzilla.redhat.com/1989651

https://bugzilla.redhat.com/2001608

https://bugzilla.redhat.com/2001609

https://bugzilla.redhat.com/2001613

https://bugzilla.redhat.com/2001616

https://bugzilla.redhat.com/2001619

https://bugzilla.redhat.com/2001621

https://bugzilla.redhat.com/2001623

https://bugzilla.redhat.com/2001645

https://bugzilla.redhat.com/2001649

https://bugzilla.redhat.com/2001650

https://bugzilla.redhat.com/2001651

https://bugzilla.redhat.com/2001652

https://bugzilla.redhat.com/2001653

https://bugzilla.redhat.com/2001654

https://bugzilla.redhat.com/2001656

https://bugzilla.redhat.com/2001658

https://bugzilla.redhat.com/2001659

https://bugzilla.redhat.com/2001661

https://bugzilla.redhat.com/2001662

https://bugzilla.redhat.com/2001665

https://bugzilla.redhat.com/2001667

Plugin Details

Severity: High

ID: 153804

File Name: redhat-RHSA-2021-3704.nasl

Version: 1.2

Type: local

Agent: unix

Published: 10/1/2021

Updated: 10/1/2021

Dependencies: ssh_get_info.nasl, redhat_repos.nasl

Risk Information

CVSS Score Source: CVE-2021-39263

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.9

Temporal Score: 5.1

Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:redhat:enterprise_linux:SLOF, p-cpe:/a:redhat:enterprise_linux:hivex, p-cpe:/a:redhat:enterprise_linux:hivex-devel, p-cpe:/a:redhat:enterprise_linux:libguestfs, p-cpe:/a:redhat:enterprise_linux:libguestfs-bash-completion, p-cpe:/a:redhat:enterprise_linux:libguestfs-benchmarking, p-cpe:/a:redhat:enterprise_linux:libguestfs-devel, p-cpe:/a:redhat:enterprise_linux:libguestfs-gfs2, p-cpe:/a:redhat:enterprise_linux:libguestfs-gobject, p-cpe:/a:redhat:enterprise_linux:libguestfs-gobject-devel, p-cpe:/a:redhat:enterprise_linux:libguestfs-inspect-icons, p-cpe:/a:redhat:enterprise_linux:libguestfs-java, p-cpe:/a:redhat:enterprise_linux:libguestfs-java-devel, p-cpe:/a:redhat:enterprise_linux:libguestfs-javadoc, p-cpe:/a:redhat:enterprise_linux:libguestfs-man-pages-ja, p-cpe:/a:redhat:enterprise_linux:libguestfs-man-pages-uk, p-cpe:/a:redhat:enterprise_linux:libguestfs-rescue, p-cpe:/a:redhat:enterprise_linux:libguestfs-rsync, p-cpe:/a:redhat:enterprise_linux:libguestfs-tools, p-cpe:/a:redhat:enterprise_linux:libguestfs-tools-c, p-cpe:/a:redhat:enterprise_linux:libguestfs-winsupport, p-cpe:/a:redhat:enterprise_linux:libguestfs-xfs, p-cpe:/a:redhat:enterprise_linux:libiscsi, p-cpe:/a:redhat:enterprise_linux:libiscsi-devel, p-cpe:/a:redhat:enterprise_linux:libiscsi-utils, p-cpe:/a:redhat:enterprise_linux:libnbd, p-cpe:/a:redhat:enterprise_linux:libnbd-devel, p-cpe:/a:redhat:enterprise_linux:libtpms, p-cpe:/a:redhat:enterprise_linux:libtpms-devel, p-cpe:/a:redhat:enterprise_linux:libvirt, p-cpe:/a:redhat:enterprise_linux:libvirt-admin, p-cpe:/a:redhat:enterprise_linux:libvirt-bash-completion, p-cpe:/a:redhat:enterprise_linux:libvirt-client, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-config-network, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-config-nwfilter, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-interface, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-network, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-nodedev, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-nwfilter, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-qemu, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-secret, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-core, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-disk, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-gluster, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-iscsi, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-iscsi-direct, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-logical, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-mpath, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-rbd, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-scsi, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-kvm, p-cpe:/a:redhat:enterprise_linux:libvirt-dbus, p-cpe:/a:redhat:enterprise_linux:libvirt-devel, p-cpe:/a:redhat:enterprise_linux:libvirt-docs, p-cpe:/a:redhat:enterprise_linux:libvirt-libs, p-cpe:/a:redhat:enterprise_linux:libvirt-lock-sanlock, p-cpe:/a:redhat:enterprise_linux:libvirt-nss, p-cpe:/a:redhat:enterprise_linux:lua-guestfs, p-cpe:/a:redhat:enterprise_linux:nbdfuse, p-cpe:/a:redhat:enterprise_linux:nbdkit, p-cpe:/a:redhat:enterprise_linux:nbdkit-bash-completion, p-cpe:/a:redhat:enterprise_linux:nbdkit-basic-filters, p-cpe:/a:redhat:enterprise_linux:nbdkit-basic-plugins, p-cpe:/a:redhat:enterprise_linux:nbdkit-curl-plugin, p-cpe:/a:redhat:enterprise_linux:nbdkit-devel, p-cpe:/a:redhat:enterprise_linux:nbdkit-example-plugins, p-cpe:/a:redhat:enterprise_linux:nbdkit-gzip-plugin, p-cpe:/a:redhat:enterprise_linux:nbdkit-linuxdisk-plugin, p-cpe:/a:redhat:enterprise_linux:nbdkit-python-plugin, p-cpe:/a:redhat:enterprise_linux:nbdkit-server, p-cpe:/a:redhat:enterprise_linux:nbdkit-ssh-plugin, p-cpe:/a:redhat:enterprise_linux:nbdkit-vddk-plugin, p-cpe:/a:redhat:enterprise_linux:nbdkit-xz-filter, p-cpe:/a:redhat:enterprise_linux:netcf, p-cpe:/a:redhat:enterprise_linux:netcf-devel, p-cpe:/a:redhat:enterprise_linux:netcf-libs, p-cpe:/a:redhat:enterprise_linux:ocaml-hivex, p-cpe:/a:redhat:enterprise_linux:ocaml-hivex-devel, p-cpe:/a:redhat:enterprise_linux:ocaml-libguestfs, p-cpe:/a:redhat:enterprise_linux:ocaml-libguestfs-devel, p-cpe:/a:redhat:enterprise_linux:ocaml-libnbd, p-cpe:/a:redhat:enterprise_linux:ocaml-libnbd-devel, p-cpe:/a:redhat:enterprise_linux:perl-Sys-Guestfs, p-cpe:/a:redhat:enterprise_linux:perl-Sys-Virt, p-cpe:/a:redhat:enterprise_linux:perl-hivex, p-cpe:/a:redhat:enterprise_linux:python3-hivex, p-cpe:/a:redhat:enterprise_linux:python3-libguestfs, p-cpe:/a:redhat:enterprise_linux:python3-libnbd, p-cpe:/a:redhat:enterprise_linux:python3-libvirt, p-cpe:/a:redhat:enterprise_linux:python3-pyvmomi, p-cpe:/a:redhat:enterprise_linux:qemu-guest-agent, p-cpe:/a:redhat:enterprise_linux:qemu-img, p-cpe:/a:redhat:enterprise_linux:qemu-kvm, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-block-curl, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-block-gluster, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-block-iscsi, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-block-rbd, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-block-ssh, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-common, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-core, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-tests, p-cpe:/a:redhat:enterprise_linux:ruby-hivex, p-cpe:/a:redhat:enterprise_linux:ruby-libguestfs, p-cpe:/a:redhat:enterprise_linux:seabios, p-cpe:/a:redhat:enterprise_linux:seabios-bin, p-cpe:/a:redhat:enterprise_linux:seavgabios-bin, p-cpe:/a:redhat:enterprise_linux:sgabios, p-cpe:/a:redhat:enterprise_linux:sgabios-bin, p-cpe:/a:redhat:enterprise_linux:supermin, p-cpe:/a:redhat:enterprise_linux:supermin-devel, p-cpe:/a:redhat:enterprise_linux:swtpm, p-cpe:/a:redhat:enterprise_linux:swtpm-devel, p-cpe:/a:redhat:enterprise_linux:swtpm-libs, p-cpe:/a:redhat:enterprise_linux:swtpm-tools, p-cpe:/a:redhat:enterprise_linux:virglrenderer, p-cpe:/a:redhat:enterprise_linux:virglrenderer-devel, p-cpe:/a:redhat:enterprise_linux:virglrenderer-test-server, p-cpe:/a:redhat:enterprise_linux:virt-dib, p-cpe:/a:redhat:enterprise_linux:virt-v2v

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 9/30/2021

Vulnerability Publication Date: 8/5/2021

Reference Information

CVE: CVE-2021-3631, CVE-2021-3667, CVE-2021-3682, CVE-2021-33285, CVE-2021-33286, CVE-2021-33287, CVE-2021-33289, CVE-2021-35266, CVE-2021-35267, CVE-2021-35268, CVE-2021-35269, CVE-2021-39251, CVE-2021-39252, CVE-2021-39253, CVE-2021-39254, CVE-2021-39255, CVE-2021-39256, CVE-2021-39257, CVE-2021-39258, CVE-2021-39259, CVE-2021-39260, CVE-2021-39261, CVE-2021-39262, CVE-2021-39263

RHSA: 2021:3704

CWE: 119, 667, 732, 763