Amazon Linux 2022 : (ALAS2022-2022-050)

high Nessus Plugin ID 164724

Synopsis

The remote Amazon Linux 2022 host is missing a security update.

Description

It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2022-2022-050 advisory.

- The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID. (CVE-2018-13405)

- A flaw was found in the QEMU virtio-fs shared file system daemon (virtiofsd) implementation. This flaw is strictly related to CVE-2018-13405. A local guest user can create files in the directories shared by virtio-fs with unintended group ownership in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of the group. This could allow a malicious unprivileged user inside the guest to gain access to resources accessible to the root group, potentially escalating their privileges within the guest. A malicious local user in the host might also leverage this unexpected executable file created by the guest to escalate their privileges on the host system. (CVE-2022-0358)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Run 'dnf update --releasever=2022.0.20220419 qemu' to update your system.

See Also

https://alas.aws.amazon.com/AL2022/ALAS-2022-050.html

https://alas.aws.amazon.com/cve/html/CVE-2018-13405.html

https://alas.aws.amazon.com/cve/html/CVE-2022-0358.html

Plugin Details

Severity: High

ID: 164724

File Name: al2022_ALAS2022-2022-050.nasl

Version: 1.4

Type: local

Agent: unix

Published: 9/6/2022

Updated: 3/23/2023

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Temporal Score: 3.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2018-13405

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2022-0358

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:qemu-debugsource, p-cpe:/a:amazon:linux:qemu-device-display-qxl, p-cpe:/a:amazon:linux:qemu, p-cpe:/a:amazon:linux:qemu-audio-alsa, p-cpe:/a:amazon:linux:qemu-audio-alsa-debuginfo, p-cpe:/a:amazon:linux:qemu-audio-oss, p-cpe:/a:amazon:linux:qemu-audio-oss-debuginfo, p-cpe:/a:amazon:linux:qemu-audio-pa, p-cpe:/a:amazon:linux:qemu-audio-pa-debuginfo, p-cpe:/a:amazon:linux:qemu-audio-sdl, p-cpe:/a:amazon:linux:qemu-device-display-qxl-debuginfo, p-cpe:/a:amazon:linux:qemu-device-display-vhost-user-gpu, p-cpe:/a:amazon:linux:qemu-device-display-vhost-user-gpu-debuginfo, p-cpe:/a:amazon:linux:qemu-device-display-virtio-gpu, p-cpe:/a:amazon:linux:qemu-device-display-virtio-gpu-ccw, p-cpe:/a:amazon:linux:qemu-device-display-virtio-gpu-ccw-debuginfo, p-cpe:/a:amazon:linux:qemu-device-display-virtio-gpu-debuginfo, p-cpe:/a:amazon:linux:qemu-device-display-virtio-gpu-gl, p-cpe:/a:amazon:linux:qemu-device-display-virtio-gpu-gl-debuginfo, p-cpe:/a:amazon:linux:qemu-device-display-virtio-gpu-pci, p-cpe:/a:amazon:linux:qemu-device-display-virtio-gpu-pci-debuginfo, p-cpe:/a:amazon:linux:qemu-device-display-virtio-gpu-pci-gl, p-cpe:/a:amazon:linux:qemu-device-display-virtio-gpu-pci-gl-debuginfo, p-cpe:/a:amazon:linux:qemu-device-display-virtio-vga, p-cpe:/a:amazon:linux:qemu-device-display-virtio-vga-debuginfo, p-cpe:/a:amazon:linux:qemu-device-display-virtio-vga-gl, p-cpe:/a:amazon:linux:qemu-device-display-virtio-vga-gl-debuginfo, p-cpe:/a:amazon:linux:qemu-device-usb-host, p-cpe:/a:amazon:linux:qemu-device-usb-host-debuginfo, p-cpe:/a:amazon:linux:qemu-device-usb-redirect, p-cpe:/a:amazon:linux:qemu-device-usb-redirect-debuginfo, p-cpe:/a:amazon:linux:qemu-device-usb-smartcard, p-cpe:/a:amazon:linux:qemu-device-usb-smartcard-debuginfo, p-cpe:/a:amazon:linux:qemu-docs, p-cpe:/a:amazon:linux:qemu-guest-agent, p-cpe:/a:amazon:linux:qemu-guest-agent-debuginfo, p-cpe:/a:amazon:linux:qemu-audio-sdl-debuginfo, p-cpe:/a:amazon:linux:qemu-audio-spice, p-cpe:/a:amazon:linux:qemu-audio-spice-debuginfo, p-cpe:/a:amazon:linux:qemu-block-curl, p-cpe:/a:amazon:linux:qemu-block-curl-debuginfo, p-cpe:/a:amazon:linux:qemu-block-dmg, p-cpe:/a:amazon:linux:qemu-block-dmg-debuginfo, p-cpe:/a:amazon:linux:qemu-block-iscsi, p-cpe:/a:amazon:linux:qemu-block-iscsi-debuginfo, p-cpe:/a:amazon:linux:qemu-block-nfs, p-cpe:/a:amazon:linux:qemu-block-nfs-debuginfo, p-cpe:/a:amazon:linux:qemu-block-ssh, p-cpe:/a:amazon:linux:qemu-block-ssh-debuginfo, p-cpe:/a:amazon:linux:qemu-char-baum, p-cpe:/a:amazon:linux:qemu-char-baum-debuginfo, p-cpe:/a:amazon:linux:qemu-char-spice, p-cpe:/a:amazon:linux:qemu-char-spice-debuginfo, p-cpe:/a:amazon:linux:qemu-common, p-cpe:/a:amazon:linux:qemu-common-debuginfo, p-cpe:/a:amazon:linux:qemu-debuginfo, p-cpe:/a:amazon:linux:qemu-system-mips, p-cpe:/a:amazon:linux:qemu-system-mips-core, p-cpe:/a:amazon:linux:qemu-system-mips-core-debuginfo, p-cpe:/a:amazon:linux:qemu-system-nios2, p-cpe:/a:amazon:linux:qemu-system-nios2-core, p-cpe:/a:amazon:linux:qemu-system-nios2-core-debuginfo, p-cpe:/a:amazon:linux:qemu-system-or1k, p-cpe:/a:amazon:linux:qemu-system-or1k-core, p-cpe:/a:amazon:linux:qemu-system-or1k-core-debuginfo, p-cpe:/a:amazon:linux:qemu-system-ppc, p-cpe:/a:amazon:linux:qemu-system-ppc-core, p-cpe:/a:amazon:linux:qemu-system-ppc-core-debuginfo, p-cpe:/a:amazon:linux:qemu-system-riscv, p-cpe:/a:amazon:linux:qemu-system-riscv-core, p-cpe:/a:amazon:linux:qemu-system-riscv-core-debuginfo, p-cpe:/a:amazon:linux:qemu-system-rx, p-cpe:/a:amazon:linux:qemu-system-rx-core, p-cpe:/a:amazon:linux:qemu-system-rx-core-debuginfo, p-cpe:/a:amazon:linux:qemu-system-s390x, p-cpe:/a:amazon:linux:qemu-system-s390x-core, p-cpe:/a:amazon:linux:qemu-system-s390x-core-debuginfo, p-cpe:/a:amazon:linux:qemu-system-sh4, p-cpe:/a:amazon:linux:qemu-system-sh4-core, p-cpe:/a:amazon:linux:qemu-system-sh4-core-debuginfo, p-cpe:/a:amazon:linux:qemu-system-sparc, p-cpe:/a:amazon:linux:qemu-system-sparc-core, p-cpe:/a:amazon:linux:qemu-system-sparc-core-debuginfo, p-cpe:/a:amazon:linux:qemu-system-tricore, p-cpe:/a:amazon:linux:qemu-system-tricore-core, p-cpe:/a:amazon:linux:qemu-system-tricore-core-debuginfo, p-cpe:/a:amazon:linux:qemu-system-x86, p-cpe:/a:amazon:linux:qemu-system-x86-core, p-cpe:/a:amazon:linux:qemu-system-x86-core-debuginfo, p-cpe:/a:amazon:linux:qemu-system-xtensa, p-cpe:/a:amazon:linux:qemu-system-xtensa-core, p-cpe:/a:amazon:linux:qemu-system-xtensa-core-debuginfo, p-cpe:/a:amazon:linux:qemu-tests, p-cpe:/a:amazon:linux:qemu-tests-debuginfo, p-cpe:/a:amazon:linux:qemu-tools, p-cpe:/a:amazon:linux:qemu-tools-debuginfo, p-cpe:/a:amazon:linux:qemu-ui-curses, p-cpe:/a:amazon:linux:qemu-ui-curses-debuginfo, p-cpe:/a:amazon:linux:qemu-ui-egl-headless, p-cpe:/a:amazon:linux:qemu-ui-egl-headless-debuginfo, p-cpe:/a:amazon:linux:qemu-ui-gtk, p-cpe:/a:amazon:linux:qemu-ui-gtk-debuginfo, p-cpe:/a:amazon:linux:qemu-ui-opengl, p-cpe:/a:amazon:linux:qemu-ui-opengl-debuginfo, p-cpe:/a:amazon:linux:qemu-ui-sdl, p-cpe:/a:amazon:linux:qemu-ui-sdl-debuginfo, p-cpe:/a:amazon:linux:qemu-ui-spice-app, p-cpe:/a:amazon:linux:qemu-ui-spice-app-debuginfo, p-cpe:/a:amazon:linux:qemu-ui-spice-core, p-cpe:/a:amazon:linux:qemu-ui-spice-core-debuginfo, p-cpe:/a:amazon:linux:qemu-user, p-cpe:/a:amazon:linux:qemu-user-binfmt, p-cpe:/a:amazon:linux:qemu-user-debuginfo, p-cpe:/a:amazon:linux:qemu-user-static, p-cpe:/a:amazon:linux:qemu-user-static-debuginfo, cpe:/o:amazon:linux:2022, p-cpe:/a:amazon:linux:qemu-img, p-cpe:/a:amazon:linux:qemu-img-debuginfo, p-cpe:/a:amazon:linux:qemu-kvm, p-cpe:/a:amazon:linux:qemu-kvm-core, p-cpe:/a:amazon:linux:qemu-pr-helper, p-cpe:/a:amazon:linux:qemu-pr-helper-debuginfo, p-cpe:/a:amazon:linux:qemu-system-aarch64, p-cpe:/a:amazon:linux:qemu-system-aarch64-core, p-cpe:/a:amazon:linux:qemu-system-aarch64-core-debuginfo, p-cpe:/a:amazon:linux:qemu-system-alpha, p-cpe:/a:amazon:linux:qemu-system-alpha-core, p-cpe:/a:amazon:linux:qemu-system-alpha-core-debuginfo, p-cpe:/a:amazon:linux:qemu-system-arm, p-cpe:/a:amazon:linux:qemu-system-arm-core, p-cpe:/a:amazon:linux:qemu-system-arm-core-debuginfo, p-cpe:/a:amazon:linux:qemu-system-avr, p-cpe:/a:amazon:linux:qemu-system-avr-core, p-cpe:/a:amazon:linux:qemu-system-avr-core-debuginfo, p-cpe:/a:amazon:linux:qemu-system-cris, p-cpe:/a:amazon:linux:qemu-system-cris-core, p-cpe:/a:amazon:linux:qemu-system-cris-core-debuginfo, p-cpe:/a:amazon:linux:qemu-system-hppa, p-cpe:/a:amazon:linux:qemu-system-hppa-core, p-cpe:/a:amazon:linux:qemu-system-hppa-core-debuginfo, p-cpe:/a:amazon:linux:qemu-system-m68k, p-cpe:/a:amazon:linux:qemu-system-m68k-core, p-cpe:/a:amazon:linux:qemu-system-m68k-core-debuginfo, p-cpe:/a:amazon:linux:qemu-system-microblaze, p-cpe:/a:amazon:linux:qemu-system-microblaze-core, p-cpe:/a:amazon:linux:qemu-system-microblaze-core-debuginfo

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/19/2022

Vulnerability Publication Date: 7/6/2018

Reference Information

CVE: CVE-2018-13405, CVE-2022-0358