Multiple vulnerabilities in Red Hat Virtualization 4 for RHEL 8



Published: 2022-06-05
Risk High
Patch available YES
Number of vulnerabilities 7
CVE-ID CVE-2018-25032
CVE-2021-4028
CVE-2021-4083
CVE-2022-0778
CVE-2022-1271
CVE-2022-24903
CVE-2022-25636
CWE-ID CWE-119
CWE-416
CWE-835
CWE-20
CWE-122
Exploitation vector Network
Public exploit Public exploit code for vulnerability #4 is available.
Public exploit code for vulnerability #7 is available.
Vulnerable software
Subscribe
elfutils (Red Hat package)
Operating systems & Components / Operating system package or component

redhat-release-virtualization-host (Red Hat package)
Operating systems & Components / Operating system package or component

imgbased (Red Hat package)
Operating systems & Components / Operating system package or component

redhat-virtualization-host-productimg (Red Hat package)
Operating systems & Components / Operating system package or component

ovirt-node-ng (Red Hat package)
Operating systems & Components / Operating system package or component

Red Hat Virtualization Host
Web applications / Remote management & hosting panels

Red Hat Virtualization
Server applications / Virtualization software

Vendor Red Hat Inc.

Security Bulletin

This security bulletin contains information about 7 vulnerabilities.

1) Buffer overflow

EUVDB-ID: #VU61671

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-25032

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input when compressing data. A remote attacker can pass specially crafted input to the application, trigger memory corruption and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

elfutils (Red Hat package): 0.176-5.el8 - 0.185-1.el8

redhat-release-virtualization-host (Red Hat package): 4.4.2-1.el8ev - 4.4.10-3.el8ev

imgbased (Red Hat package): 1.2.12-0.1.el8ev - 1.2.23-1.el8ev

Red Hat Virtualization Host: 4

Red Hat Virtualization: 4

redhat-virtualization-host-productimg (Red Hat package): before 4.5.0-2.el8

ovirt-node-ng (Red Hat package): before 4.4.2-1.el8ev

External links

http://access.redhat.com/errata/RHSA-2022:4896


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Use-after-free

EUVDB-ID: #VU60797

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-4028

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in the RDMA listen() function in Linux kernel. A local user can run a specially crafted program to trigger a use-after-free error and execute arbitrary code with elevated privileges.


Mitigation

Install updates from vendor's website.

Vulnerable software versions

elfutils (Red Hat package): 0.176-5.el8 - 0.185-1.el8

redhat-release-virtualization-host (Red Hat package): 4.4.2-1.el8ev - 4.4.10-3.el8ev

imgbased (Red Hat package): 1.2.12-0.1.el8ev - 1.2.23-1.el8ev

Red Hat Virtualization Host: 4

Red Hat Virtualization: 4

redhat-virtualization-host-productimg (Red Hat package): before 4.5.0-2.el8

ovirt-node-ng (Red Hat package): before 4.4.2-1.el8ev

External links

http://access.redhat.com/errata/RHSA-2022:4896


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Use-after-free

EUVDB-ID: #VU61246

Risk: Low

CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-4083

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the Linux kernel's garbage collection for Unix domain socket file handlers. A local user can call close() and fget() simultaneously and can potentially trigger a race condition, which in turn leads to a use-after-free error and allows privilege escalation.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

elfutils (Red Hat package): 0.176-5.el8 - 0.185-1.el8

redhat-release-virtualization-host (Red Hat package): 4.4.2-1.el8ev - 4.4.10-3.el8ev

imgbased (Red Hat package): 1.2.12-0.1.el8ev - 1.2.23-1.el8ev

Red Hat Virtualization Host: 4

Red Hat Virtualization: 4

redhat-virtualization-host-productimg (Red Hat package): before 4.5.0-2.el8

ovirt-node-ng (Red Hat package): before 4.4.2-1.el8ev

External links

http://access.redhat.com/errata/RHSA-2022:4896


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Infinite loop

EUVDB-ID: #VU61391

Risk: Medium

CVSSv3.1: 6.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2022-0778

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the BN_mod_sqrt() function when processing an ASN.1 certificate that contains elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. A remote attacker can supply a specially crafted certificate to the TLS server or client, consume all available system resources and cause denial of service conditions.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

elfutils (Red Hat package): 0.176-5.el8 - 0.185-1.el8

redhat-release-virtualization-host (Red Hat package): 4.4.2-1.el8ev - 4.4.10-3.el8ev

imgbased (Red Hat package): 1.2.12-0.1.el8ev - 1.2.23-1.el8ev

Red Hat Virtualization Host: 4

Red Hat Virtualization: 4

redhat-virtualization-host-productimg (Red Hat package): before 4.5.0-2.el8

ovirt-node-ng (Red Hat package): before 4.4.2-1.el8ev

External links

http://access.redhat.com/errata/RHSA-2022:4896


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

5) Input validation error

EUVDB-ID: #VU62002

Risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-1271

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to insufficient validation when processing filenames with two or more newlines. A remote attacker can force zgrep or xzgrep to write arbitrary files on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise the affected system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

elfutils (Red Hat package): 0.176-5.el8 - 0.185-1.el8

redhat-release-virtualization-host (Red Hat package): 4.4.2-1.el8ev - 4.4.10-3.el8ev

imgbased (Red Hat package): 1.2.12-0.1.el8ev - 1.2.23-1.el8ev

Red Hat Virtualization Host: 4

Red Hat Virtualization: 4

redhat-virtualization-host-productimg (Red Hat package): before 4.5.0-2.el8

ovirt-node-ng (Red Hat package): before 4.4.2-1.el8ev

External links

http://access.redhat.com/errata/RHSA-2022:4896


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Heap-based buffer overflow

EUVDB-ID: #VU62830

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-24903

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service or potentially execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when parsing data in imtcp, imptcp, imgssapi, and imhttp modules used for TCP syslog reception. A remote attacker can pass specially crafted data to the application, trigger heap-based buffer overflow and cause a denial of service or potentially execute arbitrary code on the target system.

Successful exploitation of this vulnerability is possible if the attacker is able to directly send specially crafted messages to the rsyslog daemon or by injecting specially crafted data into log files. Vulnerability exploitation in the second scenario requires that the rsyslog client supports octet-counted framing, which is not a default configuration.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

elfutils (Red Hat package): 0.176-5.el8 - 0.185-1.el8

redhat-release-virtualization-host (Red Hat package): 4.4.2-1.el8ev - 4.4.10-3.el8ev

imgbased (Red Hat package): 1.2.12-0.1.el8ev - 1.2.23-1.el8ev

Red Hat Virtualization Host: 4

Red Hat Virtualization: 4

redhat-virtualization-host-productimg (Red Hat package): before 4.5.0-2.el8

ovirt-node-ng (Red Hat package): before 4.4.2-1.el8ev

External links

http://access.redhat.com/errata/RHSA-2022:4896


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Heap-based buffer overflow

EUVDB-ID: #VU61271

Risk: Low

CVSSv3.1: 7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2022-25636

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: Yes

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in net/netfilter/nf_dup_netdev.c in the Linux kernel, related to nf_tables_offload. A local user can trigger a heap-based buffer overflow and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

elfutils (Red Hat package): 0.176-5.el8 - 0.185-1.el8

redhat-release-virtualization-host (Red Hat package): 4.4.2-1.el8ev - 4.4.10-3.el8ev

imgbased (Red Hat package): 1.2.12-0.1.el8ev - 1.2.23-1.el8ev

Red Hat Virtualization Host: 4

Red Hat Virtualization: 4

redhat-virtualization-host-productimg (Red Hat package): before 4.5.0-2.el8

ovirt-node-ng (Red Hat package): before 4.4.2-1.el8ev

External links

http://access.redhat.com/errata/RHSA-2022:4896


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###