RHEL 9 : qemu-kvm (RHSA-2022:7967)

high Nessus Plugin ID 167571

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

The remote Redhat Enterprise Linux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2022:7967 advisory.

Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.

The following packages have been upgraded to a later upstream version: qemu-kvm (7.0.0). (BZ#2064757)

Security Fix(es):

* QEMU: hcd-ehci: DMA reentrancy issue leads to use-after-free (CVE-2021-3750)

* QEMU: fdc: heap buffer overflow in DMA read data transfers (CVE-2021-3507)

* QEMU: intel-hda: segmentation fault due to stack overflow (CVE-2021-3611)

* QEMU: NULL pointer dereference in pci_write() in hw/acpi/pcihp.c (CVE-2021-4158)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.redhat.com/show_bug.cgi?id=2099541

https://bugzilla.redhat.com/show_bug.cgi?id=2099934

https://bugzilla.redhat.com/show_bug.cgi?id=2100106

https://bugzilla.redhat.com/show_bug.cgi?id=2107466

https://bugzilla.redhat.com/show_bug.cgi?id=2111994

https://bugzilla.redhat.com/show_bug.cgi?id=2112303

https://bugzilla.redhat.com/show_bug.cgi?id=2114060

https://bugzilla.redhat.com/show_bug.cgi?id=2116876

https://bugzilla.redhat.com/show_bug.cgi?id=2120275

http://www.nessus.org/u?1f1eb6cc

http://www.nessus.org/u?60996fc9

https://access.redhat.com/security/updates/classification/#moderate

https://access.redhat.com/errata/RHSA-2022:7967

https://bugzilla.redhat.com/show_bug.cgi?id=1477099

https://bugzilla.redhat.com/show_bug.cgi?id=1708300

https://bugzilla.redhat.com/show_bug.cgi?id=1879437

https://bugzilla.redhat.com/show_bug.cgi?id=1904267

https://bugzilla.redhat.com/show_bug.cgi?id=1951118

https://bugzilla.redhat.com/show_bug.cgi?id=1968509

https://bugzilla.redhat.com/show_bug.cgi?id=1973784

https://bugzilla.redhat.com/show_bug.cgi?id=1982600

https://bugzilla.redhat.com/show_bug.cgi?id=1995710

https://bugzilla.redhat.com/show_bug.cgi?id=1999073

https://bugzilla.redhat.com/show_bug.cgi?id=2020993

https://bugzilla.redhat.com/show_bug.cgi?id=2023977

https://bugzilla.redhat.com/show_bug.cgi?id=2026955

https://bugzilla.redhat.com/show_bug.cgi?id=2035002

https://bugzilla.redhat.com/show_bug.cgi?id=2037612

https://bugzilla.redhat.com/show_bug.cgi?id=2041823

https://bugzilla.redhat.com/show_bug.cgi?id=2044162

https://bugzilla.redhat.com/show_bug.cgi?id=2046029

https://bugzilla.redhat.com/show_bug.cgi?id=2060839

https://bugzilla.redhat.com/show_bug.cgi?id=2062809

https://bugzilla.redhat.com/show_bug.cgi?id=2062813

https://bugzilla.redhat.com/show_bug.cgi?id=2062817

https://bugzilla.redhat.com/show_bug.cgi?id=2062819

https://bugzilla.redhat.com/show_bug.cgi?id=2062828

https://bugzilla.redhat.com/show_bug.cgi?id=2064500

https://bugzilla.redhat.com/show_bug.cgi?id=2064530

https://bugzilla.redhat.com/show_bug.cgi?id=2064757

https://bugzilla.redhat.com/show_bug.cgi?id=2064771

https://bugzilla.redhat.com/show_bug.cgi?id=2064782

https://bugzilla.redhat.com/show_bug.cgi?id=2065398

https://bugzilla.redhat.com/show_bug.cgi?id=2066824

https://bugzilla.redhat.com/show_bug.cgi?id=2070804

https://bugzilla.redhat.com/show_bug.cgi?id=2072379

https://bugzilla.redhat.com/show_bug.cgi?id=2079347

https://bugzilla.redhat.com/show_bug.cgi?id=2079938

https://bugzilla.redhat.com/show_bug.cgi?id=2081022

https://bugzilla.redhat.com/show_bug.cgi?id=2086262

https://bugzilla.redhat.com/show_bug.cgi?id=2094252

https://bugzilla.redhat.com/show_bug.cgi?id=2094270

https://bugzilla.redhat.com/show_bug.cgi?id=2095608

https://bugzilla.redhat.com/show_bug.cgi?id=2096143

Plugin Details

Severity: High

ID: 167571

File Name: redhat-RHSA-2022-7967.nasl

Version: 1.6

Type: local

Agent: unix

Published: 11/15/2022

Updated: 11/7/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.3

Vendor

Vendor Severity: Moderate

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Temporal Score: 3.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2021-3750

CVSS v3

Risk Factor: High

Base Score: 8.2

Temporal Score: 7.4

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:qemu-guest-agent, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-device-display-virtio-gpu-pci, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-block-rbd, p-cpe:/a:redhat:enterprise_linux:qemu-img, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-device-display-virtio-vga, p-cpe:/a:redhat:enterprise_linux:qemu-kvm, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-device-usb-redirect, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-block-curl, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-device-usb-host, p-cpe:/a:redhat:enterprise_linux:qemu-pr-helper, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-ui-opengl, cpe:/o:redhat:enterprise_linux:9, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-device-display-virtio-gpu-ccw, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-docs, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-device-display-virtio-gpu, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-device-display-virtio-gpu-pci-gl, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-core, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-ui-egl-headless, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-device-display-virtio-gpu-gl, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-device-display-virtio-vga-gl, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-tools, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-audio-pa, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-common

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/15/2022

Vulnerability Publication Date: 5/6/2021

Reference Information

CVE: CVE-2021-3507, CVE-2021-3611, CVE-2021-3750, CVE-2021-4158

CWE: 119, 416, 476, 787

RHSA: 2022:7967