Anolis OS update for qemu



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-3446
CWE-ID CWE-415
Exploitation vector Local
Public exploit N/A
Vulnerable software
Anolis OS
Operating systems & Components / Operating system

qemu-user-binfmt
Operating systems & Components / Operating system package or component

qemu-user
Operating systems & Components / Operating system package or component

qemu-ui-spice-core
Operating systems & Components / Operating system package or component

qemu-ui-spice-app
Operating systems & Components / Operating system package or component

qemu-ui-opengl
Operating systems & Components / Operating system package or component

qemu-ui-gtk
Operating systems & Components / Operating system package or component

qemu-ui-egl-headless
Operating systems & Components / Operating system package or component

qemu-ui-dbus
Operating systems & Components / Operating system package or component

qemu-ui-curses
Operating systems & Components / Operating system package or component

qemu-tools
Operating systems & Components / Operating system package or component

qemu-tests
Operating systems & Components / Operating system package or component

qemu-system-x86-core
Operating systems & Components / Operating system package or component

qemu-system-x86
Operating systems & Components / Operating system package or component

qemu-system-riscv-core
Operating systems & Components / Operating system package or component

qemu-system-riscv
Operating systems & Components / Operating system package or component

qemu-system-loongarch64-core
Operating systems & Components / Operating system package or component

qemu-system-loongarch64
Operating systems & Components / Operating system package or component

qemu-system-arm-core
Operating systems & Components / Operating system package or component

qemu-system-arm
Operating systems & Components / Operating system package or component

qemu-system-aarch64-core
Operating systems & Components / Operating system package or component

qemu-system-aarch64
Operating systems & Components / Operating system package or component

qemu-pr-helper
Operating systems & Components / Operating system package or component

qemu-kvm-core
Operating systems & Components / Operating system package or component

qemu-kvm
Operating systems & Components / Operating system package or component

qemu-img
Operating systems & Components / Operating system package or component

qemu-guest-agent
Operating systems & Components / Operating system package or component

qemu-docs
Operating systems & Components / Operating system package or component

qemu-device-usb-smartcard
Operating systems & Components / Operating system package or component

qemu-device-usb-redirect
Operating systems & Components / Operating system package or component

qemu-device-usb-host
Operating systems & Components / Operating system package or component

qemu-device-display-virtio-vga-gl
Operating systems & Components / Operating system package or component

qemu-device-display-virtio-vga
Operating systems & Components / Operating system package or component

qemu-device-display-virtio-gpu-pci
Operating systems & Components / Operating system package or component

qemu-device-display-virtio-gpu-ccw
Operating systems & Components / Operating system package or component

qemu-device-display-virtio-gpu
Operating systems & Components / Operating system package or component

qemu-device-display-qxl
Operating systems & Components / Operating system package or component

qemu-common
Operating systems & Components / Operating system package or component

qemu-char-spice
Operating systems & Components / Operating system package or component

qemu-char-baum
Operating systems & Components / Operating system package or component

qemu-block-ssh
Operating systems & Components / Operating system package or component

qemu-block-iscsi
Operating systems & Components / Operating system package or component

qemu-block-gluster
Operating systems & Components / Operating system package or component

qemu-block-dmg
Operating systems & Components / Operating system package or component

qemu-block-curl
Operating systems & Components / Operating system package or component

qemu-audio-spice
Operating systems & Components / Operating system package or component

qemu-audio-pa
Operating systems & Components / Operating system package or component

qemu-audio-oss
Operating systems & Components / Operating system package or component

qemu-audio-dbus
Operating systems & Components / Operating system package or component

qemu-audio-alsa
Operating systems & Components / Operating system package or component

qemu
Operating systems & Components / Operating system package or component

Vendor OpenAnolis

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Double free

EUVDB-ID: #VU89047

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-3446

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a malicious guest to escalate privileges on the system.

The vulnerability exists due to a boundary error in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. A malicious guest can trigger a double free error and execute arbitrary code within the context of the QEMU process on the host.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 23

qemu-user-binfmt: before 8.2.0-15

qemu-user: before 8.2.0-15

qemu-ui-spice-core: before 8.2.0-15

qemu-ui-spice-app: before 8.2.0-15

qemu-ui-opengl: before 8.2.0-15

qemu-ui-gtk: before 8.2.0-15

qemu-ui-egl-headless: before 8.2.0-15

qemu-ui-dbus: before 8.2.0-15

qemu-ui-curses: before 8.2.0-15

qemu-tools: before 8.2.0-15

qemu-tests: before 8.2.0-15

qemu-system-x86-core: before 8.2.0-15

qemu-system-x86: before 8.2.0-15

qemu-system-riscv-core: before 8.2.0-15

qemu-system-riscv: before 8.2.0-15

qemu-system-loongarch64-core: before 8.2.0-15

qemu-system-loongarch64: before 8.2.0-15

qemu-system-arm-core: before 8.2.0-15

qemu-system-arm: before 8.2.0-15

qemu-system-aarch64-core: before 8.2.0-15

qemu-system-aarch64: before 8.2.0-15

qemu-pr-helper: before 8.2.0-15

qemu-kvm-core: before 8.2.0-15

qemu-kvm: before 8.2.0-15

qemu-img: before 8.2.0-15

qemu-guest-agent: before 8.2.0-15

qemu-docs: before 8.2.0-15

qemu-device-usb-smartcard: before 8.2.0-15

qemu-device-usb-redirect: before 8.2.0-15

qemu-device-usb-host: before 8.2.0-15

qemu-device-display-virtio-vga-gl: before 8.2.0-15

qemu-device-display-virtio-vga: before 8.2.0-15

qemu-device-display-virtio-gpu-pci: before 8.2.0-15

qemu-device-display-virtio-gpu-ccw: before 8.2.0-15

qemu-device-display-virtio-gpu: before 8.2.0-15

qemu-device-display-qxl: before 8.2.0-15

qemu-common: before 8.2.0-15

qemu-char-spice: before 8.2.0-15

qemu-char-baum: before 8.2.0-15

qemu-block-ssh: before 8.2.0-15

qemu-block-iscsi: before 8.2.0-15

qemu-block-gluster: before 8.2.0-15

qemu-block-dmg: before 8.2.0-15

qemu-block-curl: before 8.2.0-15

qemu-audio-spice: before 8.2.0-15

qemu-audio-pa: before 8.2.0-15

qemu-audio-oss: before 8.2.0-15

qemu-audio-dbus: before 8.2.0-15

qemu-audio-alsa: before 8.2.0-15

qemu: before 8.2.0-15

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2024:0584


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###