Ubuntu 22.04 LTS / 23.04 : libvirt vulnerabilities (USN-6126-1)

medium Nessus Plugin ID 176534

Synopsis

The remote Ubuntu host is missing one or more security updates.

Description

The remote Ubuntu 22.04 LTS / 22.10 / 23.04 host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-6126-1 advisory.

- A flaw was found in the libvirt nwfilter driver. The virNWFilterObjListNumOfNWFilters method failed to acquire the driver->nwfilters mutex before iterating over virNWFilterObj instances. There was no protection to stop another thread from concurrently modifying the driver->nwfilters object. This flaw allows a malicious, unprivileged user to exploit this issue via libvirt's API virConnectNumOfNWFilters to crash the network filter management daemon (libvirtd/virtnwfilterd). (CVE-2022-0897)

- A vulnerability was found in libvirt. This security flaw ouccers due to repeatedly querying an SR-IOV PCI device's capabilities that exposes a memory leak caused by a failure to free the virPCIVirtualFunction array within the parent struct's g_autoptr cleanup. (CVE-2023-2700)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://ubuntu.com/security/notices/USN-6126-1

Plugin Details

Severity: Medium

ID: 176534

File Name: ubuntu_USN-6126-1.nasl

Version: 1.3

Type: local

Agent: unix

Published: 5/31/2023

Updated: 10/20/2023

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4

Temporal Score: 3

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P

CVSS Score Source: CVE-2022-0897

CVSS v3

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2023-2700

Vulnerability Information

CPE: cpe:/o:canonical:ubuntu_linux:22.04:-:lts, cpe:/o:canonical:ubuntu_linux:23.04, p-cpe:/a:canonical:ubuntu_linux:libnss-libvirt, p-cpe:/a:canonical:ubuntu_linux:libvirt-clients, p-cpe:/a:canonical:ubuntu_linux:libvirt-clients-qemu, p-cpe:/a:canonical:ubuntu_linux:libvirt-daemon, p-cpe:/a:canonical:ubuntu_linux:libvirt-daemon-config-network, p-cpe:/a:canonical:ubuntu_linux:libvirt-daemon-config-nwfilter, p-cpe:/a:canonical:ubuntu_linux:libvirt-daemon-driver-lxc, p-cpe:/a:canonical:ubuntu_linux:libvirt-daemon-driver-qemu, p-cpe:/a:canonical:ubuntu_linux:libvirt-daemon-driver-storage-gluster, p-cpe:/a:canonical:ubuntu_linux:libvirt-daemon-driver-storage-iscsi-direct, p-cpe:/a:canonical:ubuntu_linux:libvirt-daemon-driver-storage-rbd, p-cpe:/a:canonical:ubuntu_linux:libvirt-daemon-driver-storage-zfs, p-cpe:/a:canonical:ubuntu_linux:libvirt-daemon-driver-vbox, p-cpe:/a:canonical:ubuntu_linux:libvirt-daemon-driver-xen, p-cpe:/a:canonical:ubuntu_linux:libvirt-daemon-system, p-cpe:/a:canonical:ubuntu_linux:libvirt-daemon-system-systemd, p-cpe:/a:canonical:ubuntu_linux:libvirt-daemon-system-sysv, p-cpe:/a:canonical:ubuntu_linux:libvirt-dev, p-cpe:/a:canonical:ubuntu_linux:libvirt-l10n, p-cpe:/a:canonical:ubuntu_linux:libvirt-login-shell, p-cpe:/a:canonical:ubuntu_linux:libvirt-sanlock, p-cpe:/a:canonical:ubuntu_linux:libvirt-wireshark, p-cpe:/a:canonical:ubuntu_linux:libvirt0

Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 5/31/2023

Vulnerability Publication Date: 3/25/2022

Reference Information

CVE: CVE-2022-0897, CVE-2023-2700

USN: 6126-1