SUSE update for qemu



Published: 2022-03-22
Risk Medium
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2021-3930
CVE-2022-0358
CWE-ID CWE-193
CWE-276
Exploitation vector Local network
Public exploit N/A
Vulnerable software
Subscribe
SUSE Linux Enterprise Server
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing
Operating systems & Components / Operating system

SUSE Linux Enterprise Desktop
Operating systems & Components / Operating system

SUSE Manager Server
Operating systems & Components / Operating system

SUSE Manager Proxy
Operating systems & Components / Operating system

SUSE Linux Enterprise Micro
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications
Operating systems & Components / Operating system

SUSE Linux Enterprise Module for Basesystem
Operating systems & Components / Operating system

SUSE Linux Enterprise Module for Server Applications
Operating systems & Components / Operating system

qemu-tools-debuginfo
Operating systems & Components / Operating system package or component

qemu-tools
Operating systems & Components / Operating system package or component

qemu-s390x-debuginfo
Operating systems & Components / Operating system package or component

qemu-s390x
Operating systems & Components / Operating system package or component

qemu-hw-s390x-virtio-gpu-ccw-debuginfo
Operating systems & Components / Operating system package or component

qemu-hw-s390x-virtio-gpu-ccw
Operating systems & Components / Operating system package or component

qemu-x86-debuginfo
Operating systems & Components / Operating system package or component

qemu-x86
Operating systems & Components / Operating system package or component

qemu-audio-pa-debuginfo
Operating systems & Components / Operating system package or component

qemu-audio-pa
Operating systems & Components / Operating system package or component

qemu-audio-alsa-debuginfo
Operating systems & Components / Operating system package or component

qemu-audio-alsa
Operating systems & Components / Operating system package or component

qemu-vgabios
Operating systems & Components / Operating system package or component

qemu-skiboot
Operating systems & Components / Operating system package or component

qemu-sgabios
Operating systems & Components / Operating system package or component

qemu-seabios
Operating systems & Components / Operating system package or component

qemu-ipxe
Operating systems & Components / Operating system package or component

qemu-SLOF
Operating systems & Components / Operating system package or component

qemu-ppc-debuginfo
Operating systems & Components / Operating system package or component

qemu-ppc
Operating systems & Components / Operating system package or component

qemu-arm-debuginfo
Operating systems & Components / Operating system package or component

qemu-arm
Operating systems & Components / Operating system package or component

qemu-kvm
Operating systems & Components / Operating system package or component

qemu-hw-display-virtio-gpu-pci-debuginfo
Operating systems & Components / Operating system package or component

qemu-hw-display-virtio-gpu-pci
Operating systems & Components / Operating system package or component

qemu-hw-display-virtio-gpu-debuginfo
Operating systems & Components / Operating system package or component

qemu-hw-display-virtio-gpu
Operating systems & Components / Operating system package or component

qemu-ui-spice-core-debuginfo
Operating systems & Components / Operating system package or component

qemu-ui-spice-core
Operating systems & Components / Operating system package or component

qemu-ui-spice-app-debuginfo
Operating systems & Components / Operating system package or component

qemu-ui-spice-app
Operating systems & Components / Operating system package or component

qemu-ui-opengl-debuginfo
Operating systems & Components / Operating system package or component

qemu-ui-opengl
Operating systems & Components / Operating system package or component

qemu-ui-gtk-debuginfo
Operating systems & Components / Operating system package or component

qemu-ui-gtk
Operating systems & Components / Operating system package or component

qemu-hw-usb-redirect-debuginfo
Operating systems & Components / Operating system package or component

qemu-hw-usb-redirect
Operating systems & Components / Operating system package or component

qemu-hw-display-virtio-vga-debuginfo
Operating systems & Components / Operating system package or component

qemu-hw-display-virtio-vga
Operating systems & Components / Operating system package or component

qemu-hw-display-qxl-debuginfo
Operating systems & Components / Operating system package or component

qemu-hw-display-qxl
Operating systems & Components / Operating system package or component

qemu-chardev-spice-debuginfo
Operating systems & Components / Operating system package or component

qemu-chardev-spice
Operating systems & Components / Operating system package or component

qemu-audio-spice-debuginfo
Operating systems & Components / Operating system package or component

qemu-audio-spice
Operating systems & Components / Operating system package or component

qemu-ui-curses-debuginfo
Operating systems & Components / Operating system package or component

qemu-ui-curses
Operating systems & Components / Operating system package or component

qemu-lang
Operating systems & Components / Operating system package or component

qemu-ksm
Operating systems & Components / Operating system package or component

qemu-guest-agent-debuginfo
Operating systems & Components / Operating system package or component

qemu-guest-agent
Operating systems & Components / Operating system package or component

qemu-debugsource
Operating systems & Components / Operating system package or component

qemu-debuginfo
Operating systems & Components / Operating system package or component

qemu-chardev-baum-debuginfo
Operating systems & Components / Operating system package or component

qemu-chardev-baum
Operating systems & Components / Operating system package or component

qemu-block-ssh-debuginfo
Operating systems & Components / Operating system package or component

qemu-block-ssh
Operating systems & Components / Operating system package or component

qemu-block-rbd-debuginfo
Operating systems & Components / Operating system package or component

qemu-block-rbd
Operating systems & Components / Operating system package or component

qemu-block-iscsi-debuginfo
Operating systems & Components / Operating system package or component

qemu-block-iscsi
Operating systems & Components / Operating system package or component

qemu-block-curl-debuginfo
Operating systems & Components / Operating system package or component

qemu-block-curl
Operating systems & Components / Operating system package or component

qemu
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Off-by-one

EUVDB-ID: #VU58812

Risk: Medium

CVSSv3.1: 5.9 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-3930

CWE-ID: CWE-193 - Off-by-one Error

Exploit availability: No

Description

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to an off-by-one error in the SCSI device emulation in QEMU. A remote user on the guest OS can can trigger an off-by-one error while processing MODE SELECT commands in mode_sense_page() if the 'page' argument is set to MODE_PAGE_ALLS (0x3f). Successful exploitation of the vulnerability may result in QEMU crash.

Mitigation

Update the affected package qemu to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server: 15-SP3-LTSS

SUSE Linux Enterprise High Performance Computing: 15-SP3-LTSS

SUSE Linux Enterprise Desktop: 15-SP3

SUSE Manager Server: 4.2

SUSE Manager Proxy: 4.2

SUSE Linux Enterprise Micro: 5.1

SUSE Linux Enterprise Server for SAP Applications: 15-SP3

SUSE Linux Enterprise Module for Basesystem: 15-SP3

SUSE Linux Enterprise Module for Server Applications: 15-SP3

qemu-tools-debuginfo: before 5.2.0-150300.112.4

qemu-tools: before 5.2.0-150300.112.4

qemu-s390x-debuginfo: before 5.2.0-150300.112.4

qemu-s390x: before 5.2.0-150300.112.4

qemu-hw-s390x-virtio-gpu-ccw-debuginfo: before 5.2.0-150300.112.4

qemu-hw-s390x-virtio-gpu-ccw: before 5.2.0-150300.112.4

qemu-x86-debuginfo: before 5.2.0-150300.112.4

qemu-x86: before 5.2.0-150300.112.4

qemu-audio-pa-debuginfo: before 5.2.0-150300.112.4

qemu-audio-pa: before 5.2.0-150300.112.4

qemu-audio-alsa-debuginfo: before 5.2.0-150300.112.4

qemu-audio-alsa: before 5.2.0-150300.112.4

qemu-vgabios: before 1.14.0_0_g155821a-150300.112.4

qemu-skiboot: before 5.2.0-150300.112.4

qemu-sgabios: before 8-150300.112.4

qemu-seabios: before 1.14.0_0_g155821a-150300.112.4

qemu-ipxe: before 1.0.0+-150300.112.4

qemu-SLOF: before 5.2.0-150300.112.4

qemu-ppc-debuginfo: before 5.2.0-150300.112.4

qemu-ppc: before 5.2.0-150300.112.4

qemu-arm-debuginfo: before 5.2.0-150300.112.4

qemu-arm: before 5.2.0-150300.112.4

qemu-kvm: before 5.2.0-150300.112.4

qemu-hw-display-virtio-gpu-pci-debuginfo: before 5.2.0-150300.112.4

qemu-hw-display-virtio-gpu-pci: before 5.2.0-150300.112.4

qemu-hw-display-virtio-gpu-debuginfo: before 5.2.0-150300.112.4

qemu-hw-display-virtio-gpu: before 5.2.0-150300.112.4

qemu-ui-spice-core-debuginfo: before 5.2.0-150300.112.4

qemu-ui-spice-core: before 5.2.0-150300.112.4

qemu-ui-spice-app-debuginfo: before 5.2.0-150300.112.4

qemu-ui-spice-app: before 5.2.0-150300.112.4

qemu-ui-opengl-debuginfo: before 5.2.0-150300.112.4

qemu-ui-opengl: before 5.2.0-150300.112.4

qemu-ui-gtk-debuginfo: before 5.2.0-150300.112.4

qemu-ui-gtk: before 5.2.0-150300.112.4

qemu-hw-usb-redirect-debuginfo: before 5.2.0-150300.112.4

qemu-hw-usb-redirect: before 5.2.0-150300.112.4

qemu-hw-display-virtio-vga-debuginfo: before 5.2.0-150300.112.4

qemu-hw-display-virtio-vga: before 5.2.0-150300.112.4

qemu-hw-display-qxl-debuginfo: before 5.2.0-150300.112.4

qemu-hw-display-qxl: before 5.2.0-150300.112.4

qemu-chardev-spice-debuginfo: before 5.2.0-150300.112.4

qemu-chardev-spice: before 5.2.0-150300.112.4

qemu-audio-spice-debuginfo: before 5.2.0-150300.112.4

qemu-audio-spice: before 5.2.0-150300.112.4

qemu-ui-curses-debuginfo: before 5.2.0-150300.112.4

qemu-ui-curses: before 5.2.0-150300.112.4

qemu-lang: before 5.2.0-150300.112.4

qemu-ksm: before 5.2.0-150300.112.4

qemu-guest-agent-debuginfo: before 5.2.0-150300.112.4

qemu-guest-agent: before 5.2.0-150300.112.4

qemu-debugsource: before 5.2.0-150300.112.4

qemu-debuginfo: before 5.2.0-150300.112.4

qemu-chardev-baum-debuginfo: before 5.2.0-150300.112.4

qemu-chardev-baum: before 5.2.0-150300.112.4

qemu-block-ssh-debuginfo: before 5.2.0-150300.112.4

qemu-block-ssh: before 5.2.0-150300.112.4

qemu-block-rbd-debuginfo: before 5.2.0-150300.112.4

qemu-block-rbd: before 5.2.0-150300.112.4

qemu-block-iscsi-debuginfo: before 5.2.0-150300.112.4

qemu-block-iscsi: before 5.2.0-150300.112.4

qemu-block-curl-debuginfo: before 5.2.0-150300.112.4

qemu-block-curl: before 5.2.0-150300.112.4

qemu: before 5.2.0-150300.112.4

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20220930-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Incorrect default permissions

EUVDB-ID: #VU61492

Risk: Low

CVSSv3.1: 6.2 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-0358

CWE-ID: CWE-276 - Incorrect Default Permissions

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to incorrect QEMU virtio-fs shared file system daemon (virtiofsd) implementation. An attacker on the guest OS can create files in the directories shared by virtio-fs with unintended group ownership in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of the group. This can lead to privilege escalation within the guest OS.

The vulnerability exists due to incomplete fox for #VU13631 (CVE-2018-13405).

Mitigation

Update the affected package qemu to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server: 15-SP3-LTSS

SUSE Linux Enterprise High Performance Computing: 15-SP3-LTSS

SUSE Linux Enterprise Desktop: 15-SP3

SUSE Manager Server: 4.2

SUSE Manager Proxy: 4.2

SUSE Linux Enterprise Micro: 5.1

SUSE Linux Enterprise Server for SAP Applications: 15-SP3

SUSE Linux Enterprise Module for Basesystem: 15-SP3

SUSE Linux Enterprise Module for Server Applications: 15-SP3

qemu-tools-debuginfo: before 5.2.0-150300.112.4

qemu-tools: before 5.2.0-150300.112.4

qemu-s390x-debuginfo: before 5.2.0-150300.112.4

qemu-s390x: before 5.2.0-150300.112.4

qemu-hw-s390x-virtio-gpu-ccw-debuginfo: before 5.2.0-150300.112.4

qemu-hw-s390x-virtio-gpu-ccw: before 5.2.0-150300.112.4

qemu-x86-debuginfo: before 5.2.0-150300.112.4

qemu-x86: before 5.2.0-150300.112.4

qemu-audio-pa-debuginfo: before 5.2.0-150300.112.4

qemu-audio-pa: before 5.2.0-150300.112.4

qemu-audio-alsa-debuginfo: before 5.2.0-150300.112.4

qemu-audio-alsa: before 5.2.0-150300.112.4

qemu-vgabios: before 1.14.0_0_g155821a-150300.112.4

qemu-skiboot: before 5.2.0-150300.112.4

qemu-sgabios: before 8-150300.112.4

qemu-seabios: before 1.14.0_0_g155821a-150300.112.4

qemu-ipxe: before 1.0.0+-150300.112.4

qemu-SLOF: before 5.2.0-150300.112.4

qemu-ppc-debuginfo: before 5.2.0-150300.112.4

qemu-ppc: before 5.2.0-150300.112.4

qemu-arm-debuginfo: before 5.2.0-150300.112.4

qemu-arm: before 5.2.0-150300.112.4

qemu-kvm: before 5.2.0-150300.112.4

qemu-hw-display-virtio-gpu-pci-debuginfo: before 5.2.0-150300.112.4

qemu-hw-display-virtio-gpu-pci: before 5.2.0-150300.112.4

qemu-hw-display-virtio-gpu-debuginfo: before 5.2.0-150300.112.4

qemu-hw-display-virtio-gpu: before 5.2.0-150300.112.4

qemu-ui-spice-core-debuginfo: before 5.2.0-150300.112.4

qemu-ui-spice-core: before 5.2.0-150300.112.4

qemu-ui-spice-app-debuginfo: before 5.2.0-150300.112.4

qemu-ui-spice-app: before 5.2.0-150300.112.4

qemu-ui-opengl-debuginfo: before 5.2.0-150300.112.4

qemu-ui-opengl: before 5.2.0-150300.112.4

qemu-ui-gtk-debuginfo: before 5.2.0-150300.112.4

qemu-ui-gtk: before 5.2.0-150300.112.4

qemu-hw-usb-redirect-debuginfo: before 5.2.0-150300.112.4

qemu-hw-usb-redirect: before 5.2.0-150300.112.4

qemu-hw-display-virtio-vga-debuginfo: before 5.2.0-150300.112.4

qemu-hw-display-virtio-vga: before 5.2.0-150300.112.4

qemu-hw-display-qxl-debuginfo: before 5.2.0-150300.112.4

qemu-hw-display-qxl: before 5.2.0-150300.112.4

qemu-chardev-spice-debuginfo: before 5.2.0-150300.112.4

qemu-chardev-spice: before 5.2.0-150300.112.4

qemu-audio-spice-debuginfo: before 5.2.0-150300.112.4

qemu-audio-spice: before 5.2.0-150300.112.4

qemu-ui-curses-debuginfo: before 5.2.0-150300.112.4

qemu-ui-curses: before 5.2.0-150300.112.4

qemu-lang: before 5.2.0-150300.112.4

qemu-ksm: before 5.2.0-150300.112.4

qemu-guest-agent-debuginfo: before 5.2.0-150300.112.4

qemu-guest-agent: before 5.2.0-150300.112.4

qemu-debugsource: before 5.2.0-150300.112.4

qemu-debuginfo: before 5.2.0-150300.112.4

qemu-chardev-baum-debuginfo: before 5.2.0-150300.112.4

qemu-chardev-baum: before 5.2.0-150300.112.4

qemu-block-ssh-debuginfo: before 5.2.0-150300.112.4

qemu-block-ssh: before 5.2.0-150300.112.4

qemu-block-rbd-debuginfo: before 5.2.0-150300.112.4

qemu-block-rbd: before 5.2.0-150300.112.4

qemu-block-iscsi-debuginfo: before 5.2.0-150300.112.4

qemu-block-iscsi: before 5.2.0-150300.112.4

qemu-block-curl-debuginfo: before 5.2.0-150300.112.4

qemu-block-curl: before 5.2.0-150300.112.4

qemu: before 5.2.0-150300.112.4

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20220930-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###