SB2023082526 - Fedora 38 update for qemu



SB2023082526 - Fedora 38 update for qemu

Published: August 25, 2023

Security Bulletin ID SB2023082526
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Improper Privilege Management (CVE-ID: CVE-2023-0664)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper privilege management in the QEMU Guest Agent service for Windows. A local user can manipulate the QEMU Guest Agent's Windows installer via repair custom action and escalate privileges on the system.


2) Out-of-bounds write (CVE-ID: CVE-2023-3180)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the virtio_crypto_handle_sym_req() function in hw/virtio/virtio-crypto.c of the QEMU virtual crypto device when handling data encryption/decryption requests. A local user trigger an out-of-bounds write and perform a denial of service 9DoS) attack.


3) Infinite loop (CVE-ID: CVE-2023-3255)

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the vnc_client_cut_text_ext function in ui/vnc-clipboard.c. A remote authenticated client who is able to send a clipboard to the QEMU built-in VNC server can perform a denial of service conditions.


4) NULL pointer dereference (CVE-ID: CVE-2023-3354)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in the QEMU built-in VNC server. When a client connects to the VNC server, QEMU checks whether the current number of connections crosses a certain threshold and if so, cleans up the previous connection. If the previous connection happens to be in the handshake phase and fails, QEMU cleans up the connection again, resulting in NULL pointer dereference and denial of service.


Remediation

Install update from vendor's website.