EulerOS 2.0 SP9 qemu security update
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
Tenable Nessus | EulerOS 2.0 SP9 : qemu (EulerOS-SA-2022-1034) | 28 Jan 202200:00 | – | nessus |
Tenable Nessus | EulerOS Virtualization 3.0.2.0 : qemu (EulerOS-SA-2021-2844) | 29 Dec 202100:00 | – | nessus |
Tenable Nessus | EulerOS Virtualization 2.9.1 : qemu (EulerOS-SA-2021-2192) | 13 Jul 202100:00 | – | nessus |
Tenable Nessus | EulerOS Virtualization 2.9.0 : qemu (EulerOS-SA-2021-2211) | 13 Jul 202100:00 | – | nessus |
Tenable Nessus | EulerOS Virtualization 3.0.2.6 : qemu-kvm (EulerOS-SA-2023-1051) | 6 Jan 202300:00 | – | nessus |
Tenable Nessus | EulerOS Virtualization 2.10.0 : qemu (EulerOS-SA-2022-1418) | 18 Apr 202200:00 | – | nessus |
Tenable Nessus | EulerOS Virtualization 2.10.1 : qemu (EulerOS-SA-2022-1392) | 18 Apr 202200:00 | – | nessus |
Tenable Nessus | Ubuntu 18.04 LTS / 20.04 LTS : QEMU vulnerabilities (USN-5010-1) | 16 Jul 202100:00 | – | nessus |
Tenable Nessus | Debian DLA-2753-1 : qemu - LTS security update | 3 Sep 202100:00 | – | nessus |
Tenable Nessus | Debian DSA-4980-1 : qemu - security update | 4 Oct 202100:00 | – | nessus |
#%NASL_MIN_LEVEL 70300
##
# (C) Tenable Network Security, Inc.
##
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(157171);
script_version("1.6");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/11/17");
script_cve_id(
"CVE-2019-12067",
"CVE-2020-13754",
"CVE-2020-25085",
"CVE-2020-25742",
"CVE-2020-25743",
"CVE-2020-27617",
"CVE-2020-27821",
"CVE-2020-29129",
"CVE-2020-29443",
"CVE-2020-35504",
"CVE-2020-35505",
"CVE-2021-3392",
"CVE-2021-3416",
"CVE-2021-3527",
"CVE-2021-3544",
"CVE-2021-3545",
"CVE-2021-3546",
"CVE-2021-3592",
"CVE-2021-3593",
"CVE-2021-3595",
"CVE-2021-3682",
"CVE-2021-3713",
"CVE-2021-3748",
"CVE-2021-20181",
"CVE-2021-20203",
"CVE-2021-20221"
);
script_xref(name:"IAVB", value:"2020-B-0041-S");
script_xref(name:"IAVB", value:"2020-B-0063-S");
script_xref(name:"IAVB", value:"2020-B-0075-S");
script_name(english:"EulerOS 2.0 SP9 : qemu (EulerOS-SA-2022-1014)");
script_set_attribute(attribute:"synopsis", value:
"The remote EulerOS host is missing multiple security updates.");
script_set_attribute(attribute:"description", value:
"According to the versions of the qemu package installed, the EulerOS installation on the remote host is affected by the
following vulnerabilities :
- The ahci_commit_buf function in ide/ahci.c in QEMU allows attackers to cause a denial of service (NULL
dereference) when the command header 'ad->cur_cmd' is null. (CVE-2019-12067)
- hw/pci/msix.c in QEMU 4.2.0 allows guest OS users to trigger an out-of-bounds access via a crafted address
in an msi-x mmio operation. (CVE-2020-13754)
- QEMU 5.0.0 has a heap-based Buffer Overflow in flatview_read_continue in exec.c because hw/sd/sdhci.c
mishandles a write operation in the SDHC_BLKSIZE case. (CVE-2020-25085)
- pci_change_irq_level in hw/pci/pci.c in QEMU before 5.1.1 has a NULL pointer dereference because
pci_get_bus() might not return a valid pointer. (CVE-2020-25742)
- hw/ide/pci.c in QEMU before 5.1.1 can trigger a NULL pointer dereference because it lacks a pointer check
before an ide_cancel_dma_sync call. (CVE-2020-25743)
- eth_get_gso_type in net/eth.c in QEMU 4.2.1 allows guest OS users to trigger an assertion failure. A guest
can crash the QEMU process via packet data that lacks a valid Layer 3 protocol. (CVE-2020-27617)
- A flaw was found in the memory management API of QEMU during the initialization of a memory region cache.
This issue could lead to an out-of-bounds write access to the MSI-X table while performing MMIO
operations. A guest user may abuse this flaw to crash the QEMU process on the host, resulting in a denial
of service. This flaw affects QEMU versions prior to 5.2.0. (CVE-2020-27821)
- ncsi.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of
header data even if that exceeds the total packet length. (CVE-2020-29129)
- ide_atapi_cmd_reply_end in hw/ide/atapi.c in QEMU 5.1.0 allows out-of-bounds read access because a buffer
index is not validated. (CVE-2020-29443)
- A NULL pointer dereference flaw was found in the SCSI emulation support of QEMU in versions before 6.0.0.
This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of
service. The highest threat from this vulnerability is to system availability. (CVE-2020-35504)
- A NULL pointer dereference flaw was found in the am53c974 SCSI host bus adapter emulation of QEMU in
versions before 6.0.0. This issue occurs while handling the 'Information Transfer' command. This flaw
allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service.
The highest threat from this vulnerability is to system availability. (CVE-2020-35505)
- A race condition flaw was found in the 9pfs server implementation of QEMU up to and including 5.2.0. This
flaw allows a malicious 9p client to cause a use-after-free error, potentially escalating their privileges
on the system. The highest threat from this vulnerability is to confidentiality, integrity as well as
system availability. (CVE-2021-20181)
- An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It
may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A
privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.
(CVE-2021-20203)
- An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of
QEMU up to and including qemu 4.2.0on aarch64 platform. The issue occurs because while writing an
interrupt ID to the controller memory area, it is not masked to be 4 bits wide. It may lead to the said
issue while updating controller state fields and their subsequent processing. A privileged guest user may
use this flaw to crash the QEMU process on the host resulting in DoS scenario. (CVE-2021-20221)
- A use-after-free flaw was found in the MegaRAID emulator of QEMU. This issue occurs while processing SCSI
I/O requests in the case of an error mptsas_free_request() that does not dequeue the request object 'req'
from a pending requests queue. This flaw allows a privileged guest user to crash the QEMU process on the
host, resulting in a denial of service. Versions between 2.10.0 and 5.2.0 are potentially affected.
(CVE-2021-3392)
- A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions
up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get
bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the
host resulting in DoS scenario. (CVE-2021-3416)
- A flaw was found in the USB redirector device (usb-redir) of QEMU. Small USB packets are combined into a
single, large transfer request, to reduce the overhead and improve performance. The combined size of the
bulk transfer is used to dynamically allocate a variable length array (VLA) on the stack without proper
validation. Since the total size is not bounded, a malicious guest could use this flaw to influence the
array length and cause the QEMU process to perform an excessive allocation on the stack, resulting in a
denial of service. (CVE-2021-3527)
- Several memory leaks were found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions
up to and including 6.0. They exist in contrib/vhost-user-gpu/vhost-user-gpu.c and contrib/vhost-user-
gpu/virgl.c due to improper release of memory (i.e., free) after effective lifetime. (CVE-2021-3544)
- An information disclosure vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of
QEMU in versions up to and including 6.0. The flaw exists in virgl_cmd_get_capset_info() in contrib/vhost-
user-gpu/virgl.c and could occur due to the read of uninitialized memory. A malicious guest could exploit
this issue to leak memory from the host. (CVE-2021-3545)
- An out-of-bounds write vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of
QEMU in versions up to and including 6.0. The flaw occurs while processing the 'VIRTIO_GPU_CMD_GET_CAPSET'
command from the guest. It could allow a privileged guest user to crash the QEMU process on the host,
resulting in a denial of service condition, or potential code execution with the privileges of the QEMU
process. (CVE-2021-3546)
- An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw
exists in the bootp_input() function and could occur while processing a udp packet that is smaller than
the size of the 'bootp_t' structure. A malicious guest could use this flaw to leak 10 bytes of
uninitialized heap memory from the host. The highest threat from this vulnerability is to data
confidentiality. This flaw affects libslirp versions prior to 4.6.0. (CVE-2021-3592)
- An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw
exists in the udp6_input() function and could occur while processing a udp packet that is smaller than the
size of the 'udphdr' structure. This issue may lead to out-of-bounds read access or indirect host memory
disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw
affects libslirp versions prior to 4.6.0. (CVE-2021-3593)
- An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw
exists in the tftp_input() function and could occur while processing a udp packet that is smaller than the
size of the 'tftp_t' structure. This issue may lead to out-of-bounds read access or indirect host memory
disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw
affects libslirp versions prior to 4.6.0. (CVE-2021-3595)
- A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs
when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A
malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata,
resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the
host. (CVE-2021-3682)
- An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device emulation of QEMU in versions
prior to 6.2.0-rc0. The device uses the guest supplied stream number unchecked, which can lead to out-of-
bounds access to the UASDevice->data3 and UASDevice->status3 fields. A malicious guest user could use this
flaw to crash QEMU or potentially achieve code execution with the privileges of the QEMU process on the
host. (CVE-2021-3713)
Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security
advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional
issues.");
# https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2022-1014
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?4ea5cba8");
script_set_attribute(attribute:"solution", value:
"Update the affected qemu packages.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2021-3748");
script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2021-3682");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2020/06/02");
script_set_attribute(attribute:"patch_publication_date", value:"2022/01/28");
script_set_attribute(attribute:"plugin_publication_date", value:"2022/01/28");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:qemu-img");
script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:2.0");
script_set_attribute(attribute:"stig_severity", value:"II");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Huawei Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/sp");
script_exclude_keys("Host/EulerOS/uvp_version");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var release = get_kb_item("Host/EulerOS/release");
if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
var uvp = get_kb_item("Host/EulerOS/uvp_version");
if (release !~ "^EulerOS release 2\.0(\D|$)") audit(AUDIT_OS_NOT, "EulerOS 2.0 SP9");
var sp = get_kb_item("Host/EulerOS/sp");
if (isnull(sp) || sp !~ "^(9)$") audit(AUDIT_OS_NOT, "EulerOS 2.0 SP9");
if (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, "EulerOS 2.0 SP9", "EulerOS UVP " + uvp);
if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
if ("aarch64" >!< cpu) audit(AUDIT_ARCH_NOT, "aarch64", cpu);
var flag = 0;
var pkgs = [
"qemu-img-4.1.0-16.h10.eulerosv2r9"
];
foreach (var pkg in pkgs)
if (rpm_check(release:"EulerOS-2.0", sp:"9", reference:pkg)) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get()
);
exit(0);
}
else
{
var tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "qemu");
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo