Oracle Linux 8 : virt:ol / and / virt-devel:ol (ELSA-2021-4191)

medium Nessus Plugin ID 155984

Synopsis

The remote Oracle Linux host is missing one or more security updates.

Description

The remote Oracle Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2021-4191 advisory.

- An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0. (CVE-2021-3594)

- libvirt: Improper locking on ACL failure in virStoragePoolLookupByTargetPath API (CVE-2021-3667)

- QEMU 4.2.0 has a use-after-free in hw/net/e1000e_core.c because a guest OS user can trigger an e1000e packet with the data's address set to the e1000e's MMIO address. (CVE-2020-15859)

- An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the bootp_input() function and could occur while processing a udp packet that is smaller than the size of the 'bootp_t' structure. A malicious guest could use this flaw to leak 10 bytes of uninitialized heap memory from the host. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0. (CVE-2021-3592)

- An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp6_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0. (CVE-2021-3593)

- An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the tftp_input() function and could occur while processing a udp packet that is smaller than the size of the 'tftp_t' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0. (CVE-2021-3595)

- libvirt: Insecure sVirt label generation (CVE-2021-3631)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://linux.oracle.com/errata/ELSA-2021-4191.html

Plugin Details

Severity: Medium

ID: 155984

File Name: oraclelinux_ELSA-2021-4191.nasl

Version: 1.3

Type: local

Agent: unix

Published: 12/10/2021

Updated: 3/11/2022

Supported Sensors: Frictionless Assessment Agent, Nessus Agent

Risk Information

VPR

Risk Factor: Medium

Score: 6

CVSS v2

Risk Factor: Low

Base Score: 3.3

Temporal Score: 2.4

Vector: CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS Score Source: CVE-2021-3631

CVSS v3

Risk Factor: Medium

Base Score: 6.3

Temporal Score: 5.5

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:o:oracle:linux:8:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:qemu-img:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:qemu-kvm:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:qemu-kvm-common:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libvirt:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libvirt-devel:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libguestfs:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libguestfs-devel:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libguestfs-java:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libguestfs-java-devel:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libguestfs-javadoc:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libguestfs-tools:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libguestfs-tools-c:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:ocaml-libguestfs:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:ocaml-libguestfs-devel:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:perl-sys-guestfs:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:ruby-libguestfs:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libvirt-client:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libvirt-lock-sanlock:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:qemu-guest-agent:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libvirt-daemon:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libvirt-daemon-config-network:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libvirt-daemon-config-nwfilter:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libvirt-daemon-driver-interface:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libvirt-daemon-driver-network:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libvirt-daemon-driver-nodedev:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libvirt-daemon-driver-nwfilter:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libvirt-daemon-driver-qemu:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libvirt-daemon-driver-secret:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libvirt-daemon-driver-storage:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libvirt-daemon-kvm:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libvirt-docs:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libvirt-nss:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:hivex:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:hivex-devel:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libguestfs-bash-completion:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libguestfs-benchmarking:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libguestfs-gfs2:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libguestfs-gobject:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libguestfs-gobject-devel:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libguestfs-inspect-icons:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libguestfs-man-pages-ja:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libguestfs-man-pages-uk:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libguestfs-rescue:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libguestfs-rsync:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libguestfs-winsupport:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libguestfs-xfs:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libiscsi:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libiscsi-devel:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libiscsi-utils:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libvirt-admin:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libvirt-bash-completion:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libvirt-daemon-driver-storage-core:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libvirt-daemon-driver-storage-disk:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libvirt-daemon-driver-storage-gluster:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libvirt-daemon-driver-storage-iscsi:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libvirt-daemon-driver-storage-logical:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libvirt-daemon-driver-storage-mpath:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libvirt-daemon-driver-storage-rbd:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libvirt-daemon-driver-storage-scsi:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libvirt-dbus:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libvirt-libs:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:lua-guestfs:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:nbdkit:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:nbdkit-bash-completion:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:nbdkit-basic-plugins:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:nbdkit-devel:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:nbdkit-example-plugins:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:netcf:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:netcf-devel:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:netcf-libs:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:perl-sys-virt:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:perl-hivex:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:python3-hivex:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:python3-libguestfs:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:python3-libvirt:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:qemu-kvm-block-curl:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:qemu-kvm-block-gluster:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:qemu-kvm-block-iscsi:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:qemu-kvm-block-rbd:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:qemu-kvm-block-ssh:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:qemu-kvm-core:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:ruby-hivex:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:seabios:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:seabios-bin:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:seavgabios-bin:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:sgabios:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:sgabios-bin:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:supermin:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:supermin-devel:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:virt-dib:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:virt-v2v:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:ocaml-hivex:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:ocaml-hivex-devel:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:qemu-kvm-tests:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libnbd:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libnbd-devel:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:libvirt-daemon-driver-storage-iscsi-direct:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:nbdfuse:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:nbdkit-basic-filters:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:nbdkit-curl-plugin:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:nbdkit-gzip-plugin:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:nbdkit-linuxdisk-plugin:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:nbdkit-python-plugin:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:nbdkit-server:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:nbdkit-ssh-plugin:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:nbdkit-vddk-plugin:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:nbdkit-xz-filter:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:ocaml-libnbd:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:ocaml-libnbd-devel:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:python3-libnbd:*:*:*:*:*:*:*

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/OracleLinux

Exploit Ease: No known exploits are available

Patch Publication Date: 11/16/2021

Vulnerability Publication Date: 7/21/2020

Reference Information

CVE: CVE-2020-15859, CVE-2021-3592, CVE-2021-3595, CVE-2021-3594, CVE-2021-3593, CVE-2021-3631, CVE-2021-3667

IAVB: 2020-B-0041-S