Oracle Linux 7 : qemu (ELSA-2022-9432)

high Nessus Plugin ID 161622


The remote Oracle Linux host is missing one or more security updates.


The remote Oracle Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2022-9432 advisory.

- A use-after-free vulnerability was found in the virtio-net device of QEMU. It could occur when the descriptor's address belongs to the non direct access region, due to num_buffers being set after the virtqueue elem has been unmapped. A malicious guest could use this flaw to crash QEMU, resulting in a denial of service condition, or potentially execute code on the host with the privileges of the QEMU process. (CVE-2021-3748)

- A flaw was found in the virtio-net device of QEMU. This flaw was inadvertently introduced with the fix for CVE-2021-3748, which forgot to unmap the cached virtqueue elements on error, leading to memory leakage and other unexpected results. Affected QEMU version: 6.2.0. (CVE-2022-26353)

- A flaw was found in the vhost-vsock device of QEMU. In case of error, an invalid element was not detached from the virtqueue before freeing its memory, leading to memory leakage and other unexpected results.
Affected QEMU versions <= 6.2.0. (CVE-2022-26354)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 161622

File Name: oraclelinux_ELSA-2022-9432.nasl

Version: 1.3

Type: local

Agent: unix

Published: 5/27/2022

Updated: 1/9/2023

Supported Sensors: Frictionless Assessment Agent, Nessus Agent

Risk Information


Risk Factor: High

Score: 7.3


Risk Factor: Medium

Base Score: 6.9

Temporal Score: 5.1

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS Score Source: CVE-2021-3748


Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:qemu-img:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:qemu-kvm:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:qemu-kvm-core:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:qemu:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:qemu-block-gluster:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:qemu-block-iscsi:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:qemu-block-rbd:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:qemu-common:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:qemu-system-x86:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:qemu-system-x86-core:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:ivshmem-tools:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:qemu-system-aarch64:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:linux:qemu-system-aarch64-core:*:*:*:*:*:*:*

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/OracleLinux

Exploit Ease: No known exploits are available

Patch Publication Date: 5/26/2022

Vulnerability Publication Date: 3/16/2022

Reference Information

CVE: CVE-2021-3748, CVE-2022-26354, CVE-2022-26353