SUSE SLED15 / SLES15 / openSUSE 15 Security Update : qemu (SUSE-SU-2023:4662-1)

high Nessus Plugin ID 186635

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2023:4662-1 advisory.

- An out-of-bounds memory access flaw was found in the ATI VGA device emulation of QEMU. This flaw occurs in the ati_2d_blt() routine while handling MMIO write operations when the guest provides invalid values for the destination display parameters. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service. (CVE-2021-3638)

- A flaw was found in the QEMU virtual crypto device while handling data encryption/decryption requests in virtio_crypto_handle_sym_req. There is no check for the value of `src_len` and `dst_len` in virtio_crypto_sym_op_helper, potentially leading to a heap buffer overflow when the two values differ.
(CVE-2023-3180)

- A flaw was found in the QEMU built-in VNC server. When a client connects to the VNC server, QEMU checks whether the current number of connections crosses a certain threshold and if so, cleans up the previous connection. If the previous connection happens to be in the handshake phase and fails, QEMU cleans up the connection again, resulting in a NULL pointer dereference issue. This could allow a remote unauthenticated client to cause a denial of service. (CVE-2023-3354)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1188609

https://bugzilla.suse.com/1212850

https://bugzilla.suse.com/1213210

https://bugzilla.suse.com/1213925

https://bugzilla.suse.com/1215311

https://lists.suse.com/pipermail/sle-updates/2023-December/033027.html

https://www.suse.com/security/cve/CVE-2021-3638

https://www.suse.com/security/cve/CVE-2023-3180

https://www.suse.com/security/cve/CVE-2023-3354

Plugin Details

Severity: High

ID: 186635

File Name: suse_SU-2023-4662-1.nasl

Version: 1.2

Type: local

Agent: unix

Published: 12/7/2023

Updated: 3/15/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: Low

Base Score: 2.1

Temporal Score: 1.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2021-3638

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2023-3354

Vulnerability Information

CPE: cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:qemu, p-cpe:/a:novell:suse_linux:qemu-slof, p-cpe:/a:novell:suse_linux:qemu-accel-tcg-x86, p-cpe:/a:novell:suse_linux:qemu-arm, p-cpe:/a:novell:suse_linux:qemu-audio-alsa, p-cpe:/a:novell:suse_linux:qemu-audio-dbus, p-cpe:/a:novell:suse_linux:qemu-audio-pa, p-cpe:/a:novell:suse_linux:qemu-audio-spice, p-cpe:/a:novell:suse_linux:qemu-block-curl, p-cpe:/a:novell:suse_linux:qemu-block-iscsi, p-cpe:/a:novell:suse_linux:qemu-block-rbd, p-cpe:/a:novell:suse_linux:qemu-block-ssh, p-cpe:/a:novell:suse_linux:qemu-chardev-baum, p-cpe:/a:novell:suse_linux:qemu-chardev-spice, p-cpe:/a:novell:suse_linux:qemu-guest-agent, p-cpe:/a:novell:suse_linux:qemu-hw-display-qxl, p-cpe:/a:novell:suse_linux:qemu-hw-display-virtio-gpu, p-cpe:/a:novell:suse_linux:qemu-hw-display-virtio-gpu-pci, p-cpe:/a:novell:suse_linux:qemu-hw-display-virtio-vga, p-cpe:/a:novell:suse_linux:qemu-hw-s390x-virtio-gpu-ccw, p-cpe:/a:novell:suse_linux:qemu-hw-usb-host, p-cpe:/a:novell:suse_linux:qemu-hw-usb-redirect, p-cpe:/a:novell:suse_linux:qemu-ipxe, p-cpe:/a:novell:suse_linux:qemu-ksm, p-cpe:/a:novell:suse_linux:qemu-kvm, p-cpe:/a:novell:suse_linux:qemu-lang, p-cpe:/a:novell:suse_linux:qemu-ppc, p-cpe:/a:novell:suse_linux:qemu-s390x, p-cpe:/a:novell:suse_linux:qemu-seabios, p-cpe:/a:novell:suse_linux:qemu-sgabios, p-cpe:/a:novell:suse_linux:qemu-skiboot, p-cpe:/a:novell:suse_linux:qemu-tools, p-cpe:/a:novell:suse_linux:qemu-ui-curses, p-cpe:/a:novell:suse_linux:qemu-ui-dbus, p-cpe:/a:novell:suse_linux:qemu-ui-gtk, p-cpe:/a:novell:suse_linux:qemu-ui-opengl, p-cpe:/a:novell:suse_linux:qemu-ui-spice-app, p-cpe:/a:novell:suse_linux:qemu-ui-spice-core, p-cpe:/a:novell:suse_linux:qemu-vgabios, p-cpe:/a:novell:suse_linux:qemu-x86

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/6/2023

Vulnerability Publication Date: 3/3/2022

Reference Information

CVE: CVE-2021-3638, CVE-2023-3180, CVE-2023-3354

IAVB: 2023-B-0058-S, 2023-B-0073-S

SuSE: SUSE-SU-2023:4662-1