Rocky Linux 8 : virt:rhel and virt-devel:rhel (RLSA-2021:1762)

medium Nessus Plugin ID 184965

Synopsis

The remote Rocky Linux host is missing one or more security updates.

Description

The remote Rocky Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RLSA-2021:1762 advisory.

- iscsi_aio_ioctl_cb in block/iscsi.c in QEMU 4.1.0 has a heap-based buffer over-read that may disclose unrelated information from process memory to an attacker. (CVE-2020-11947)

- In QEMU through 5.0.0, an assertion failure can occur in the network packet processing. This issue affects the e1000e and vmxnet3 network devices. A malicious guest user/process could use this flaw to abort the QEMU process on the host, resulting in a denial of service condition in net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c. (CVE-2020-16092)

- A double free memory issue was found to occur in the libvirt API, in versions before 6.8.0, responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically, clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon, resulting in a denial of service, or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2020-25637)

- A reachable assertion issue was found in the USB EHCI emulation code of QEMU. It could occur while processing USB requests due to missing handling of DMA memory map failure. A malicious privileged user within the guest may abuse this flaw to send bogus USB requests and crash the QEMU process on the host, resulting in a denial of service. (CVE-2020-25723)

- A flaw was found in the memory management API of QEMU during the initialization of a memory region cache.
This issue could lead to an out-of-bounds write access to the MSI-X table while performing MMIO operations. A guest user may abuse this flaw to crash the QEMU process on the host, resulting in a denial of service. This flaw affects QEMU versions prior to 5.2.0. (CVE-2020-27821)

- hw/net/e1000e_core.c in QEMU 5.0.0 has an infinite loop via an RX descriptor with a NULL buffer address.
(CVE-2020-28916)

- ncsi.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length. (CVE-2020-29129)

- slirp.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length. (CVE-2020-29130)

- ide_atapi_cmd_reply_end in hw/ide/atapi.c in QEMU 5.1.0 allows out-of-bounds read access because a buffer index is not validated. (CVE-2020-29443)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://errata.rockylinux.org/RLSA-2021:1762

https://bugzilla.redhat.com/show_bug.cgi?id=1384241

https://bugzilla.redhat.com/show_bug.cgi?id=1798463

https://bugzilla.redhat.com/show_bug.cgi?id=1828952

https://bugzilla.redhat.com/show_bug.cgi?id=1834281

https://bugzilla.redhat.com/show_bug.cgi?id=1837495

https://bugzilla.redhat.com/show_bug.cgi?id=1843852

https://bugzilla.redhat.com/show_bug.cgi?id=1846975

https://bugzilla.redhat.com/show_bug.cgi?id=1850680

https://bugzilla.redhat.com/show_bug.cgi?id=1859494

https://bugzilla.redhat.com/show_bug.cgi?id=1860283

https://bugzilla.redhat.com/show_bug.cgi?id=1872854

https://bugzilla.redhat.com/show_bug.cgi?id=1874304

https://bugzilla.redhat.com/show_bug.cgi?id=1874780

https://bugzilla.redhat.com/show_bug.cgi?id=1876297

https://bugzilla.redhat.com/show_bug.cgi?id=1876742

https://bugzilla.redhat.com/show_bug.cgi?id=1880418

https://bugzilla.redhat.com/show_bug.cgi?id=1880546

https://bugzilla.redhat.com/show_bug.cgi?id=1881037

https://bugzilla.redhat.com/show_bug.cgi?id=1884531

https://bugzilla.redhat.com/show_bug.cgi?id=1893895

https://bugzilla.redhat.com/show_bug.cgi?id=1898579

https://bugzilla.redhat.com/show_bug.cgi?id=1901837

https://bugzilla.redhat.com/show_bug.cgi?id=1902231

https://bugzilla.redhat.com/show_bug.cgi?id=1902651

https://bugzilla.redhat.com/show_bug.cgi?id=1902960

https://bugzilla.redhat.com/show_bug.cgi?id=1903064

https://bugzilla.redhat.com/show_bug.cgi?id=1910220

https://bugzilla.redhat.com/show_bug.cgi?id=1910267

https://bugzilla.redhat.com/show_bug.cgi?id=1910326

https://bugzilla.redhat.com/show_bug.cgi?id=1912765

https://bugzilla.redhat.com/show_bug.cgi?id=1917446

https://bugzilla.redhat.com/show_bug.cgi?id=1918708

Plugin Details

Severity: Medium

ID: 184965

File Name: rocky_linux_RLSA-2021-1762.nasl

Version: 1.0

Type: local

Published: 11/7/2023

Updated: 11/7/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2020-25637

CVSS v3

Risk Factor: Medium

Base Score: 6.7

Temporal Score: 6

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:rocky:linux:libguestfs-gobject-debuginfo, p-cpe:/a:rocky:linux:libguestfs-gobject-devel, p-cpe:/a:rocky:linux:libguestfs-inspect-icons, p-cpe:/a:rocky:linux:libguestfs-java, p-cpe:/a:rocky:linux:libguestfs-java-debuginfo, p-cpe:/a:rocky:linux:libguestfs-java-devel, p-cpe:/a:rocky:linux:libguestfs-javadoc, p-cpe:/a:rocky:linux:libguestfs-man-pages-ja, p-cpe:/a:rocky:linux:libguestfs-man-pages-uk, p-cpe:/a:rocky:linux:libguestfs-rescue, p-cpe:/a:rocky:linux:libguestfs-rsync, p-cpe:/a:rocky:linux:libguestfs-tools, p-cpe:/a:rocky:linux:libguestfs-tools-c, p-cpe:/a:rocky:linux:libguestfs-tools-c-debuginfo, p-cpe:/a:rocky:linux:libguestfs-winsupport, p-cpe:/a:rocky:linux:libguestfs-xfs, p-cpe:/a:rocky:linux:libiscsi, p-cpe:/a:rocky:linux:libiscsi-debuginfo, p-cpe:/a:rocky:linux:libiscsi-debugsource, p-cpe:/a:rocky:linux:libiscsi-devel, p-cpe:/a:rocky:linux:libiscsi-utils, p-cpe:/a:rocky:linux:libiscsi-utils-debuginfo, p-cpe:/a:rocky:linux:libnbd, p-cpe:/a:rocky:linux:libnbd-debuginfo, p-cpe:/a:rocky:linux:libnbd-debugsource, p-cpe:/a:rocky:linux:libnbd-devel, p-cpe:/a:rocky:linux:libvirt, p-cpe:/a:rocky:linux:libvirt-admin, p-cpe:/a:rocky:linux:libvirt-admin-debuginfo, p-cpe:/a:rocky:linux:libvirt-bash-completion, p-cpe:/a:rocky:linux:libvirt-client, p-cpe:/a:rocky:linux:libvirt-client-debuginfo, p-cpe:/a:rocky:linux:libvirt-daemon, p-cpe:/a:rocky:linux:libvirt-daemon-config-network, p-cpe:/a:rocky:linux:libvirt-daemon-config-nwfilter, p-cpe:/a:rocky:linux:libvirt-daemon-debuginfo, p-cpe:/a:rocky:linux:libvirt-daemon-driver-interface, p-cpe:/a:rocky:linux:libvirt-daemon-driver-interface-debuginfo, p-cpe:/a:rocky:linux:libvirt-daemon-driver-network, p-cpe:/a:rocky:linux:libvirt-daemon-driver-network-debuginfo, p-cpe:/a:rocky:linux:libvirt-daemon-driver-nodedev, p-cpe:/a:rocky:linux:libvirt-daemon-driver-nodedev-debuginfo, p-cpe:/a:rocky:linux:libvirt-daemon-driver-nwfilter, p-cpe:/a:rocky:linux:libvirt-daemon-driver-nwfilter-debuginfo, p-cpe:/a:rocky:linux:libvirt-daemon-driver-qemu, p-cpe:/a:rocky:linux:libvirt-daemon-driver-qemu-debuginfo, p-cpe:/a:rocky:linux:libvirt-daemon-driver-secret, p-cpe:/a:rocky:linux:libvirt-daemon-driver-secret-debuginfo, p-cpe:/a:rocky:linux:libvirt-daemon-driver-storage, p-cpe:/a:rocky:linux:libvirt-daemon-driver-storage-core, p-cpe:/a:rocky:linux:libvirt-daemon-driver-storage-core-debuginfo, p-cpe:/a:rocky:linux:libvirt-daemon-driver-storage-disk, p-cpe:/a:rocky:linux:libvirt-daemon-driver-storage-disk-debuginfo, p-cpe:/a:rocky:linux:libvirt-daemon-driver-storage-gluster, p-cpe:/a:rocky:linux:libvirt-daemon-driver-storage-gluster-debuginfo, p-cpe:/a:rocky:linux:libvirt-daemon-driver-storage-iscsi, p-cpe:/a:rocky:linux:libvirt-daemon-driver-storage-iscsi-debuginfo, p-cpe:/a:rocky:linux:libvirt-daemon-driver-storage-iscsi-direct, p-cpe:/a:rocky:linux:libvirt-daemon-driver-storage-iscsi-direct-debuginfo, p-cpe:/a:rocky:linux:libvirt-daemon-driver-storage-logical, p-cpe:/a:rocky:linux:libvirt-daemon-driver-storage-logical-debuginfo, p-cpe:/a:rocky:linux:libvirt-daemon-driver-storage-mpath, p-cpe:/a:rocky:linux:libvirt-daemon-driver-storage-mpath-debuginfo, p-cpe:/a:rocky:linux:libvirt-daemon-driver-storage-rbd, p-cpe:/a:rocky:linux:libvirt-daemon-driver-storage-rbd-debuginfo, p-cpe:/a:rocky:linux:libvirt-daemon-driver-storage-scsi, p-cpe:/a:rocky:linux:libvirt-docs, p-cpe:/a:rocky:linux:libvirt-libs, p-cpe:/a:rocky:linux:libvirt-libs-debuginfo, p-cpe:/a:rocky:linux:libvirt-lock-sanlock, p-cpe:/a:rocky:linux:libvirt-lock-sanlock-debuginfo, p-cpe:/a:rocky:linux:libvirt-nss, p-cpe:/a:rocky:linux:libvirt-nss-debuginfo, p-cpe:/a:rocky:linux:libvirt-python-debugsource, p-cpe:/a:rocky:linux:lua-guestfs, p-cpe:/a:rocky:linux:lua-guestfs-debuginfo, p-cpe:/a:rocky:linux:nbdfuse, p-cpe:/a:rocky:linux:nbdfuse-debuginfo, p-cpe:/a:rocky:linux:nbdkit, p-cpe:/a:rocky:linux:nbdkit-bash-completion, p-cpe:/a:rocky:linux:nbdkit-basic-filters, p-cpe:/a:rocky:linux:nbdkit-basic-filters-debuginfo, p-cpe:/a:rocky:linux:nbdkit-basic-plugins, p-cpe:/a:rocky:linux:nbdkit-basic-plugins-debuginfo, p-cpe:/a:rocky:linux:nbdkit-curl-plugin, p-cpe:/a:rocky:linux:nbdkit-curl-plugin-debuginfo, p-cpe:/a:rocky:linux:nbdkit-debuginfo, p-cpe:/a:rocky:linux:nbdkit-debugsource, p-cpe:/a:rocky:linux:nbdkit-devel, p-cpe:/a:rocky:linux:nbdkit-example-plugins, p-cpe:/a:rocky:linux:nbdkit-example-plugins-debuginfo, p-cpe:/a:rocky:linux:nbdkit-gzip-plugin, p-cpe:/a:rocky:linux:nbdkit-gzip-plugin-debuginfo, p-cpe:/a:rocky:linux:nbdkit-linuxdisk-plugin, p-cpe:/a:rocky:linux:nbdkit-linuxdisk-plugin-debuginfo, p-cpe:/a:rocky:linux:nbdkit-python-plugin, p-cpe:/a:rocky:linux:nbdkit-python-plugin-debuginfo, p-cpe:/a:rocky:linux:nbdkit-server, p-cpe:/a:rocky:linux:nbdkit-server-debuginfo, p-cpe:/a:rocky:linux:nbdkit-ssh-plugin, p-cpe:/a:rocky:linux:nbdkit-ssh-plugin-debuginfo, p-cpe:/a:rocky:linux:nbdkit-vddk-plugin, p-cpe:/a:rocky:linux:nbdkit-vddk-plugin-debuginfo, p-cpe:/a:rocky:linux:nbdkit-xz-filter, p-cpe:/a:rocky:linux:nbdkit-xz-filter-debuginfo, p-cpe:/a:rocky:linux:netcf, p-cpe:/a:rocky:linux:netcf-debuginfo, p-cpe:/a:rocky:linux:netcf-debugsource, p-cpe:/a:rocky:linux:netcf-devel, p-cpe:/a:rocky:linux:netcf-libs, p-cpe:/a:rocky:linux:netcf-libs-debuginfo, p-cpe:/a:rocky:linux:ocaml-hivex, p-cpe:/a:rocky:linux:ocaml-hivex-debuginfo, p-cpe:/a:rocky:linux:ocaml-hivex-devel, p-cpe:/a:rocky:linux:ocaml-libguestfs, p-cpe:/a:rocky:linux:ocaml-libguestfs-debuginfo, p-cpe:/a:rocky:linux:ocaml-libguestfs-devel, p-cpe:/a:rocky:linux:ocaml-libnbd, p-cpe:/a:rocky:linux:ocaml-libnbd-debuginfo, p-cpe:/a:rocky:linux:ocaml-libnbd-devel, p-cpe:/a:rocky:linux:perl-sys-guestfs, p-cpe:/a:rocky:linux:perl-sys-guestfs-debuginfo, p-cpe:/a:rocky:linux:perl-sys-virt, p-cpe:/a:rocky:linux:perl-sys-virt-debuginfo, p-cpe:/a:rocky:linux:perl-sys-virt-debugsource, p-cpe:/a:rocky:linux:perl-hivex, p-cpe:/a:rocky:linux:perl-hivex-debuginfo, p-cpe:/a:rocky:linux:python3-hivex, p-cpe:/a:rocky:linux:python3-hivex-debuginfo, p-cpe:/a:rocky:linux:python3-libguestfs, p-cpe:/a:rocky:linux:python3-libguestfs-debuginfo, p-cpe:/a:rocky:linux:python3-libnbd, p-cpe:/a:rocky:linux:python3-libnbd-debuginfo, p-cpe:/a:rocky:linux:python3-libvirt, p-cpe:/a:rocky:linux:python3-libvirt-debuginfo, p-cpe:/a:rocky:linux:qemu-guest-agent, p-cpe:/a:rocky:linux:qemu-guest-agent-debuginfo, p-cpe:/a:rocky:linux:qemu-img, p-cpe:/a:rocky:linux:qemu-img-debuginfo, p-cpe:/a:rocky:linux:qemu-kvm, p-cpe:/a:rocky:linux:qemu-kvm-block-curl, p-cpe:/a:rocky:linux:qemu-kvm-block-curl-debuginfo, p-cpe:/a:rocky:linux:qemu-kvm-block-gluster, p-cpe:/a:rocky:linux:qemu-kvm-block-gluster-debuginfo, p-cpe:/a:rocky:linux:qemu-kvm-block-iscsi, p-cpe:/a:rocky:linux:qemu-kvm-block-iscsi-debuginfo, p-cpe:/a:rocky:linux:qemu-kvm-block-rbd, p-cpe:/a:rocky:linux:qemu-kvm-block-rbd-debuginfo, p-cpe:/a:rocky:linux:qemu-kvm-block-ssh, p-cpe:/a:rocky:linux:qemu-kvm-block-ssh-debuginfo, p-cpe:/a:rocky:linux:qemu-kvm-common, p-cpe:/a:rocky:linux:qemu-kvm-common-debuginfo, p-cpe:/a:rocky:linux:qemu-kvm-core, p-cpe:/a:rocky:linux:qemu-kvm-core-debuginfo, p-cpe:/a:rocky:linux:qemu-kvm-debuginfo, p-cpe:/a:rocky:linux:qemu-kvm-debugsource, p-cpe:/a:rocky:linux:qemu-kvm-tests, p-cpe:/a:rocky:linux:qemu-kvm-tests-debuginfo, p-cpe:/a:rocky:linux:ruby-hivex, p-cpe:/a:rocky:linux:ruby-hivex-debuginfo, p-cpe:/a:rocky:linux:ruby-libguestfs, p-cpe:/a:rocky:linux:ruby-libguestfs-debuginfo, p-cpe:/a:rocky:linux:seabios, p-cpe:/a:rocky:linux:seabios-bin, p-cpe:/a:rocky:linux:seavgabios-bin, p-cpe:/a:rocky:linux:sgabios, p-cpe:/a:rocky:linux:sgabios-bin, p-cpe:/a:rocky:linux:supermin, p-cpe:/a:rocky:linux:supermin-debuginfo, p-cpe:/a:rocky:linux:supermin-debugsource, p-cpe:/a:rocky:linux:supermin-devel, p-cpe:/a:rocky:linux:virt-dib, p-cpe:/a:rocky:linux:virt-dib-debuginfo, p-cpe:/a:rocky:linux:virt-v2v, p-cpe:/a:rocky:linux:virt-v2v-debuginfo, cpe:/o:rocky:linux:8, p-cpe:/a:rocky:linux:hivex, p-cpe:/a:rocky:linux:hivex-debuginfo, p-cpe:/a:rocky:linux:hivex-debugsource, p-cpe:/a:rocky:linux:hivex-devel, p-cpe:/a:rocky:linux:libguestfs, p-cpe:/a:rocky:linux:libguestfs-bash-completion, p-cpe:/a:rocky:linux:libguestfs-benchmarking, p-cpe:/a:rocky:linux:libguestfs-benchmarking-debuginfo, p-cpe:/a:rocky:linux:libguestfs-debuginfo, p-cpe:/a:rocky:linux:libguestfs-debugsource, p-cpe:/a:rocky:linux:libguestfs-devel, p-cpe:/a:rocky:linux:libguestfs-gfs2, p-cpe:/a:rocky:linux:libguestfs-gobject, p-cpe:/a:rocky:linux:libvirt-daemon-driver-storage-scsi-debuginfo, p-cpe:/a:rocky:linux:libvirt-daemon-kvm, p-cpe:/a:rocky:linux:libvirt-dbus, p-cpe:/a:rocky:linux:libvirt-dbus-debuginfo, p-cpe:/a:rocky:linux:libvirt-dbus-debugsource, p-cpe:/a:rocky:linux:libvirt-debuginfo, p-cpe:/a:rocky:linux:libvirt-debugsource, p-cpe:/a:rocky:linux:libvirt-devel

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RockyLinux/release, Host/RockyLinux/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/18/2021

Vulnerability Publication Date: 7/23/2020

Reference Information

CVE: CVE-2020-11947, CVE-2020-16092, CVE-2020-25637, CVE-2020-25707, CVE-2020-25723, CVE-2020-27821, CVE-2020-28916, CVE-2020-29129, CVE-2020-29130, CVE-2020-29443

IAVB: 2020-B-0075-S