安全公告详情

NS-SA-2023-0132

2023-10-10 14:36:09

简介

important: pesign/qemu security update

严重级别

important

主题

An update for pesign/qemu is now available for NewStart CGSL MAIN 6.06.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

pesign: This package contains the pesign utility for signing UEFI binaries as well as other associated tools.
qemu: This package provices a virtiofsd run on host, which sharing a host directory tree with a guest through a virtio-fs device.


Security Fix(es):
pesign: A flaw was found in pesign. The pesign package provides a systemd service used to start the pesign daemon. This service unit runs a script to set ACLs for /etc/pki/pesign and /run/pesign directories to grant access privileges to users in the 'pesign' group. However, the script doesn't check for symbolic links. This could allow an attacker to gain access to privileged files and directories via a path traversal attack.(CVE-2022-3560)
pesign: bugfix
qemu: A flaw was found in QEMU's LSI53C895A device emulator. When executing LSI scripts, a crafted sequence of I/O requests may cause the emulator to enter into an infinite loop. This vulnerability could be executed locally and would affect the availability of the system.(CVE-2019-12068)
qemu: A use-after-free issue was found in the SLiRP networking implementation of the QEMU emulator. The issue occurs in ip_reass() routine while reassembling incoming packets, if the first fragment is bigger than the m->m_dat[] buffer. A user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service.(CVE-2019-15890)
qemu: An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.(CVE-2020-14364)
qemu: An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU handled a response coming from an iSCSI server while checking the status of a Logical Address Block (LBA) in an iscsi_co_block_status() routine. A remote user could use this flaw to crash the QEMU process, resulting in a denial of service or potential execution of arbitrary code with privileges of the QEMU process on the host.(CVE-2020-1711)
qemu: A flaw was found in the USB redirector device emulation of QEMU. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host.(CVE-2021-3682)
qemu: An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device emulation of QEMU. The device uses the guest supplied stream number unchecked, which can lead to out-of-bounds access to the UASDevice->data3 and UASDevice->status3 fields. A malicious guest user could use this flaw to crash QEMU or potentially achieve code execution with the privileges of the QEMU process on the host.(CVE-2021-3713)
qemu: A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. This flaw allows a crafted guest driver to allocate and initialize a huge number of page tables to be used as a ring of descriptors for CQ and async events, potentially leading to an out-of-bounds read and crash of QEMU.(CVE-2023-1544)
qemu: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.06.03B7.

影响组件

  • pesign
  • qemu

影响产品

  • CGSL MAIN 6.06

更新包

{"fix":[{"product":"CGSL MAIN 6.06","pkgs":[{"binary":["pesign-0.112-27.0.1.zncgsl6.tm2.0.x86_64.rpm"],"source":"pesign-0.112-27.0.1.zncgsl6.tm2.0.src.rpm"},{"binary":["qemu-block-dmg-4.1.0-2.zncgsl6.tm11.0.x86_64.rpm","qemu-common-4.1.0-2.zncgsl6.tm11.0.x86_64.rpm","qemu-block-gluster-4.1.0-2.zncgsl6.tm11.0.x86_64.rpm","qemu-kvm-4.1.0-2.zncgsl6.tm11.0.x86_64.rpm","qemu-block-iscsi-4.1.0-2.zncgsl6.tm11.0.x86_64.rpm","qemu-img-4.1.0-2.zncgsl6.tm11.0.x86_64.rpm","qemu-block-rbd-4.1.0-2.zncgsl6.tm11.0.x86_64.rpm","qemu-block-curl-4.1.0-2.zncgsl6.tm11.0.x86_64.rpm","qemu-4.1.0-2.zncgsl6.tm11.0.x86_64.rpm","qemu-tools-4.1.0-2.zncgsl6.tm11.0.x86_64.rpm","qemu-block-ssh-4.1.0-2.zncgsl6.tm11.0.x86_64.rpm"],"source":"qemu-4.1.0-2.zncgsl6.tm11.0.src.rpm"}]}]}

CVE

参考