AlmaLinux 8 : virt:rhel and virt-devel:rhel (ALSA-2020:4676)

high Nessus Plugin ID 157535

Synopsis

The remote AlmaLinux host is missing one or more security updates.

Description

The remote AlmaLinux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the ALSA-2020:4676 advisory.

- libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c. (CVE-2019-15890)

- qemu/qemu_driver.c in libvirt before 6.0.0 mishandles the holding of a monitor job during a query to a guest agent, which allows attackers to cause a denial of service (API blockage). (CVE-2019-20485)

- A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service. (CVE-2020-1983)

- A NULL pointer dereference was found in the libvirt API responsible introduced in upstream version 3.10.0, and fixed in libvirt 6.0.0, for fetching a storage pool based on its target path. In more detail, this flaw affects storage pools created without a target path such as network-based pools like gluster and RBD.
Unprivileged users with a read-only connection could abuse this flaw to crash the libvirt daemon, resulting in a potential denial of service. (CVE-2020-10703)

- An information disclosure vulnerability was found in libvirt in versions before 6.3.0. HTTP cookies used to access network-based disks were saved in the XML dump of the guest domain. This flaw allows an attacker to access potentially sensitive information in the domain configuration via the `dumpxml` command.
(CVE-2020-14301)

- A flaw was found in libvirt, where it leaked a file descriptor for `/dev/mapper/control` into the QEMU process. This file descriptor allows for privileged operations to happen against the device-mapper on the host. This flaw allows a malicious guest user or process to perform operations outside of their standard permissions, potentially causing serious damage to the host operating system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. (CVE-2020-14339)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://errata.almalinux.org/8/ALSA-2020-4676.html

Plugin Details

Severity: High

ID: 157535

File Name: alma_linux_ALSA-2020-4676.nasl

Version: 1.4

Type: local

Published: 2/9/2022

Updated: 11/13/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.5

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2020-14339

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.9

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:alma:linux:hivex, p-cpe:/a:alma:linux:hivex-devel, p-cpe:/a:alma:linux:libguestfs-winsupport, p-cpe:/a:alma:linux:libiscsi, p-cpe:/a:alma:linux:libiscsi-devel, p-cpe:/a:alma:linux:libiscsi-utils, p-cpe:/a:alma:linux:libnbd, p-cpe:/a:alma:linux:libnbd-devel, p-cpe:/a:alma:linux:libvirt, p-cpe:/a:alma:linux:libvirt-admin, p-cpe:/a:alma:linux:libvirt-bash-completion, p-cpe:/a:alma:linux:libvirt-client, p-cpe:/a:alma:linux:libvirt-daemon, p-cpe:/a:alma:linux:libvirt-daemon-config-network, p-cpe:/a:alma:linux:libvirt-daemon-config-nwfilter, p-cpe:/a:alma:linux:libvirt-daemon-driver-interface, p-cpe:/a:alma:linux:libvirt-daemon-driver-network, p-cpe:/a:alma:linux:libvirt-daemon-driver-nodedev, p-cpe:/a:alma:linux:libvirt-daemon-driver-nwfilter, p-cpe:/a:alma:linux:libvirt-daemon-driver-secret, p-cpe:/a:alma:linux:libvirt-daemon-driver-storage, p-cpe:/a:alma:linux:libvirt-daemon-driver-storage-core, p-cpe:/a:alma:linux:libvirt-daemon-driver-storage-disk, p-cpe:/a:alma:linux:libvirt-daemon-driver-storage-iscsi, p-cpe:/a:alma:linux:libvirt-daemon-driver-storage-iscsi-direct, p-cpe:/a:alma:linux:libvirt-daemon-driver-storage-logical, p-cpe:/a:alma:linux:libvirt-daemon-driver-storage-mpath, p-cpe:/a:alma:linux:libvirt-daemon-driver-storage-rbd, p-cpe:/a:alma:linux:libvirt-daemon-driver-storage-scsi, p-cpe:/a:alma:linux:libvirt-dbus, p-cpe:/a:alma:linux:libvirt-devel, p-cpe:/a:alma:linux:libvirt-docs, p-cpe:/a:alma:linux:libvirt-libs, p-cpe:/a:alma:linux:libvirt-nss, p-cpe:/a:alma:linux:nbdfuse, p-cpe:/a:alma:linux:netcf, p-cpe:/a:alma:linux:netcf-devel, p-cpe:/a:alma:linux:netcf-libs, p-cpe:/a:alma:linux:ocaml-hivex, p-cpe:/a:alma:linux:ocaml-hivex-devel, p-cpe:/a:alma:linux:ocaml-libguestfs, p-cpe:/a:alma:linux:ocaml-libguestfs-devel, p-cpe:/a:alma:linux:ocaml-libnbd, p-cpe:/a:alma:linux:ocaml-libnbd-devel, p-cpe:/a:alma:linux:perl-sys-virt, p-cpe:/a:alma:linux:perl-hivex, p-cpe:/a:alma:linux:python3-hivex, p-cpe:/a:alma:linux:python3-libnbd, p-cpe:/a:alma:linux:python3-libvirt, p-cpe:/a:alma:linux:ruby-hivex, p-cpe:/a:alma:linux:sgabios, cpe:/o:alma:linux:8

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/AlmaLinux/release, Host/AlmaLinux/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/3/2020

Vulnerability Publication Date: 9/6/2019

Reference Information

CVE: CVE-2019-15890, CVE-2019-20485, CVE-2020-10703, CVE-2020-14301, CVE-2020-14339, CVE-2020-1983