SB2022111438 - Red Hat Enterprise Linux 8 update for the virt:rhel and virt-devel:rhel modules
Published: November 14, 2022 Updated: December 2, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Heap-based buffer overflow (CVE-ID: CVE-2021-3507)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in the fdctrl_transfer_handler() function in hw/block/fdc.c while processing DMA read
data transfers from the floppy drive to the guest system. A remote privileged user on the guest OS can trigger a heap-based buffer overflow and crash the QEMU process on the host OS.
2) Improper locking (CVE-ID: CVE-2022-0897)
The vulnerability allows a local user to perform a denial of service attack (DoS).
The vulnerability exists due to double-locking error within the nwfilterConnectNumOfNWFilters() function in nwfilter/nwfilter_driver.c in libvirt. An local user can abuse the libvirt API virConnectNumOfNWFilters to crash the network filter management daemon (libvirtd/virtnwfilterd).
3) Buffer overflow (CVE-ID: CVE-2022-2211)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error within the get_keys() function. A remote attacker can pass specially crafted data to the application, trigger memory corruption and perform a denial of service (DoS) attack.
4) Out-of-bounds read (CVE-ID: CVE-2022-23645)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition when the byte array representing the state of the TPM is accessed. A remote attacker can send a specially crafted header, trigger out-of-bounds read error and cause a denial of service condition on the system.
Remediation
Install update from vendor's website.