RHEL 9 : libvirt (RHSA-2022:8003)

medium Nessus Plugin ID 167642

Synopsis

The remote Red Hat host is missing a security update.

Description

The remote Redhat Enterprise Linux 9 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2022:8003 advisory.

The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.

The following packages have been upgraded to a later upstream version: libvirt (8.5.0). (BZ#2060313)

Security Fix(es):

* libvirt: missing locking in nwfilterConnectNumOfNWFilters can lead to denial of service (CVE-2022-0897)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?1f1eb6cc

http://www.nessus.org/u?a0fa98f4

https://access.redhat.com/security/updates/classification/#low

https://access.redhat.com/errata/RHSA-2022:8003

https://bugzilla.redhat.com/show_bug.cgi?id=1475431

https://bugzilla.redhat.com/show_bug.cgi?id=1653327

https://bugzilla.redhat.com/show_bug.cgi?id=1745868

https://bugzilla.redhat.com/show_bug.cgi?id=1866400

https://bugzilla.redhat.com/show_bug.cgi?id=1901394

https://bugzilla.redhat.com/show_bug.cgi?id=1910856

https://bugzilla.redhat.com/show_bug.cgi?id=1999372

https://bugzilla.redhat.com/show_bug.cgi?id=2026765

https://bugzilla.redhat.com/show_bug.cgi?id=2035163

https://bugzilla.redhat.com/show_bug.cgi?id=2036300

https://bugzilla.redhat.com/show_bug.cgi?id=2037146

https://bugzilla.redhat.com/show_bug.cgi?id=2038045

https://bugzilla.redhat.com/show_bug.cgi?id=2040548

https://bugzilla.redhat.com/show_bug.cgi?id=2040555

https://bugzilla.redhat.com/show_bug.cgi?id=2041665

https://bugzilla.redhat.com/show_bug.cgi?id=2045953

https://bugzilla.redhat.com/show_bug.cgi?id=2045959

https://bugzilla.redhat.com/show_bug.cgi?id=2046024

https://bugzilla.redhat.com/show_bug.cgi?id=2051451

https://bugzilla.redhat.com/show_bug.cgi?id=2057067

https://bugzilla.redhat.com/show_bug.cgi?id=2057768

https://bugzilla.redhat.com/show_bug.cgi?id=2060313

https://bugzilla.redhat.com/show_bug.cgi?id=2060776

https://bugzilla.redhat.com/show_bug.cgi?id=2063883

https://bugzilla.redhat.com/show_bug.cgi?id=2064115

https://bugzilla.redhat.com/show_bug.cgi?id=2065381

https://bugzilla.redhat.com/show_bug.cgi?id=2065399

https://bugzilla.redhat.com/show_bug.cgi?id=2070380

https://bugzilla.redhat.com/show_bug.cgi?id=2073867

https://bugzilla.redhat.com/show_bug.cgi?id=2073887

https://bugzilla.redhat.com/show_bug.cgi?id=2075383

https://bugzilla.redhat.com/show_bug.cgi?id=2075464

https://bugzilla.redhat.com/show_bug.cgi?id=2075765

https://bugzilla.redhat.com/show_bug.cgi?id=2075837

https://bugzilla.redhat.com/show_bug.cgi?id=2078274

https://bugzilla.redhat.com/show_bug.cgi?id=2081981

https://bugzilla.redhat.com/show_bug.cgi?id=2082540

https://bugzilla.redhat.com/show_bug.cgi?id=2089431

https://bugzilla.redhat.com/show_bug.cgi?id=2092833

https://bugzilla.redhat.com/show_bug.cgi?id=2092856

https://bugzilla.redhat.com/show_bug.cgi?id=2095260

https://bugzilla.redhat.com/show_bug.cgi?id=2102009

https://bugzilla.redhat.com/show_bug.cgi?id=2103119

https://bugzilla.redhat.com/show_bug.cgi?id=2103524

https://bugzilla.redhat.com/show_bug.cgi?id=2105231

https://bugzilla.redhat.com/show_bug.cgi?id=2107424

https://bugzilla.redhat.com/show_bug.cgi?id=2107892

https://bugzilla.redhat.com/show_bug.cgi?id=2111070

https://bugzilla.redhat.com/show_bug.cgi?id=2112348

https://bugzilla.redhat.com/show_bug.cgi?id=2121141

https://bugzilla.redhat.com/show_bug.cgi?id=2121441

Plugin Details

Severity: Medium

ID: 167642

File Name: redhat-RHSA-2022-8003.nasl

Version: 1.5

Type: local

Agent: unix

Published: 11/16/2022

Updated: 11/7/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 1.4

Vendor

Vendor Severity: Low

CVSS v2

Risk Factor: Medium

Base Score: 4

Temporal Score: 3

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P

CVSS Score Source: CVE-2022-0897

CVSS v3

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.8

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon, p-cpe:/a:redhat:enterprise_linux:libvirt-client, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-rbd, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-iscsi, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-core, cpe:/o:redhat:enterprise_linux:9, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-logical, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-scsi, p-cpe:/a:redhat:enterprise_linux:libvirt-nss, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-config-network, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-config-nwfilter, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-secret, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-nodedev, p-cpe:/a:redhat:enterprise_linux:libvirt, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-network, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-nwfilter, p-cpe:/a:redhat:enterprise_linux:libvirt-libs, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-qemu, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-disk, p-cpe:/a:redhat:enterprise_linux:libvirt-devel, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-interface, p-cpe:/a:redhat:enterprise_linux:libvirt-docs, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-kvm, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-mpath, p-cpe:/a:redhat:enterprise_linux:libvirt-lock-sanlock

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 11/15/2022

Vulnerability Publication Date: 3/25/2022

Reference Information

CVE: CVE-2022-0897

CWE: 667

RHSA: 2022:8003