Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 6 |
CVE-ID | CVE-2022-1012 CVE-2022-2132 CVE-2022-2526 CVE-2022-2588 CVE-2022-29154 CVE-2022-32250 |
CWE-ID | CWE-401 CWE-399 CWE-416 CWE-415 CWE-22 |
Exploitation vector | Network |
Public exploit |
Vulnerability #4 is being exploited in the wild. Public exploit code for vulnerability #6 is available. |
Vulnerable software |
redhat-virtualization-host-productimg (Red Hat package) Operating systems & Components / Operating system package or component redhat-release-virtualization-host (Red Hat package) Operating systems & Components / Operating system package or component Red Hat Virtualization Host Web applications / Remote management & hosting panels Red Hat Virtualization Server applications / Virtualization software |
Vendor | Red Hat Inc. |
Security Bulletin
This security bulletin contains information about 6 vulnerabilities.
EUVDB-ID: #VU64079
Risk: Medium
CVSSv3.1: 5.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-1012
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to insufficient randomization in the net/ipv4/tcp.c when calculating port offsets in Linux kernel cause by small table perturb size. A remote attacker can cause memory leak and gain access to sensitive information.
MitigationInstall updates from vendor's website.
redhat-virtualization-host-productimg (Red Hat package): 4.5.0-2.el8 - 4.5.1-1.el8
redhat-release-virtualization-host (Red Hat package): 4.5.0-5.el8ev - 4.5.1-1.el8ev
Red Hat Virtualization Host: 4
Red Hat Virtualization: 4
CPE2.3http://access.redhat.com/errata/RHSA-2022:6551
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66871
Risk: Medium
CVSSv3.1: 5.9 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-2132
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper management of internal resources within the copy_desc_to_mbuf() function when processing Vhost header. A remote guest can send a packet with the Vhost header crossing more than two descriptors and force application to allocate all available mbufs, causing a denial of service condition for the other guest running on the hypervisor.
Install updates from vendor's website.
redhat-virtualization-host-productimg (Red Hat package): 4.5.0-2.el8 - 4.5.1-1.el8
redhat-release-virtualization-host (Red Hat package): 4.5.0-5.el8ev - 4.5.1-1.el8ev
Red Hat Virtualization Host: 4
Red Hat Virtualization: 4
CPE2.3http://access.redhat.com/errata/RHSA-2022:6551
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66757
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-2526
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a use-after-free error within the on_stream_io() and dns_stream_complete() functions in resolved-dns-stream.c, which do not increment the reference counting for the DnsStream object. A remote attacker can send to the system specially crafted DNS responses, trigger a use-after-free error and perform a denial of service (DoS) attack.
Install updates from vendor's website.
redhat-virtualization-host-productimg (Red Hat package): 4.5.0-2.el8 - 4.5.1-1.el8
redhat-release-virtualization-host (Red Hat package): 4.5.0-5.el8ev - 4.5.1-1.el8ev
Red Hat Virtualization Host: 4
Red Hat Virtualization: 4
CPE2.3http://access.redhat.com/errata/RHSA-2022:6551
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66397
Risk: Low
CVSSv3.1: 7.5 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C]
CVE-ID: CVE-2022-2588
CWE-ID:
CWE-415 - Double Free
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The
vulnerability exists due to a double free error within the network packet scheduler implementation
in the route4_change() function in Linux kernel when removing all references to a route filter
before freeing it. A local user can run a specially crafted program to
crash the kernel or execute arbitrary code.
Install updates from vendor's website.
redhat-virtualization-host-productimg (Red Hat package): 4.5.0-2.el8 - 4.5.1-1.el8
redhat-release-virtualization-host (Red Hat package): 4.5.0-5.el8ev - 4.5.1-1.el8ev
Red Hat Virtualization Host: 4
Red Hat Virtualization: 4
CPE2.3http://access.redhat.com/errata/RHSA-2022:6551
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.
EUVDB-ID: #VU66189
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-29154
CWE-ID:
CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Exploit availability: No
DescriptionThe vulnerability allows a remote server to perform directory traversal attacks.
The vulnerability exists due to input validation error within the rsync client when processing file names. A remote malicious server overwrite arbitrary files in the rsync client target directory and subdirectories on the connected peer.
MitigationInstall updates from vendor's website.
redhat-virtualization-host-productimg (Red Hat package): 4.5.0-2.el8 - 4.5.1-1.el8
redhat-release-virtualization-host (Red Hat package): 4.5.0-5.el8ev - 4.5.1-1.el8ev
Red Hat Virtualization Host: 4
Red Hat Virtualization: 4
CPE2.3http://access.redhat.com/errata/RHSA-2022:6551
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64668
Risk: Low
CVSSv3.1: 7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2022-32250
CWE-ID:
CWE-416 - Use After Free
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free incorrect NFT_STATEFUL_EXPR in net/netfilter/nf_tables_api.c in Linux kernel. A local user with ability to create user/net namespaces can execute arbitrary code with root privileges.
Install updates from vendor's website.
redhat-virtualization-host-productimg (Red Hat package): 4.5.0-2.el8 - 4.5.1-1.el8
redhat-release-virtualization-host (Red Hat package): 4.5.0-5.el8ev - 4.5.1-1.el8ev
Red Hat Virtualization Host: 4
Red Hat Virtualization: 4
CPE2.3http://access.redhat.com/errata/RHSA-2022:6551
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.