RHEL 8:virt: 8.2 和 virt-devel: 8.2 (RHSA-2021: 3704)

high Nessus 插件 ID 153804
全新!插件严重性现在使用 CVSS v3

计算的插件严重性默认已更新为使用 CVSS v3。没有 CVSS v3 分数的插件将回退到 CVSS v2 来计算严重性。可以在设置下拉列表中切换严重性显示首选项。

简介

远程 Red Hat 主机缺少一个或多个安全更新。

描述

远程 Redhat Enterprise Linux 8 主机上安装的程序包受到 RHSA-2021: 3704 公告中提及的漏洞的影响。

- ntfs-3g:ntfs_get_attribute_value() 中存在越界堆缓冲区访问,这是未正确检查 MFT 记录中的 bytes_in_use 值所致 (CVE-2021-33285)

- ntfs-3g:通过特别构建的 Unicode 字符串可触发堆缓冲区溢出 (CVE-2021-33286)

- ntfs-3g:ntfs_attr_pread_i() 中存在堆缓冲区溢出,通过特别构建的 NTFS 属性,可触发此问题 (CVE-2021-33287)

- ntfs-3g:通过特别构建的 MFT 区段可触发堆缓冲区溢出 (CVE-2021-33289)

- ntfs-3g:通过特别构建的 NTFS inode 路径名称可触发堆缓冲区溢出 (CVE-2021-35266)

- ntfs-3g:在修正 MFT 和 MFTMirror 区段之间的差异时,可触发堆栈缓冲区溢出 (CVE-2021-35267)

- ntfs-3g:ntfs_inode_real_open() 中存在堆缓冲区溢出,通过特别构建的 NTFS inode 可触发此问题 (CVE-2021-35268)

- ntfs-3g:ntfs_attr_setup_flag() 中存在堆缓冲区溢出,通过 MFT 中特别构建的 NTFS 属性,可触发此问题 (CVE-2021-35269)

- libvirt:生成不安全的 sVirt 标签 (CVE-2021-3631)

- libvirt:ACL 失败时,virStoragePoolLookupByTargetPath API 存在锁定不当 (CVE-2021-3667)

- QEMU:usbredir:bufp_alloc() 中存在对无效指针调用 free() (CVE-2021-3682)

- ntfs-3g:ntfs_extent_inode_open() 中存在空指针取消引用 (CVE-2021-39251)

- ntfs-3g:ntfs_ie_lookup() 中存在越界读取 (CVE-2021-39252)

- ntfs-3g:ntfs_runlists_merge_i() 中存在越界读取 (CVE-2021-39253)

- ntfs-3g:memmove() 中存在整数溢出,可导致 ntfs_attr_record_resize() 发生堆缓冲区溢出 (CVE-2021-39254)

- ntfs-3g:ntfs_attr_find_in_attrdef() 中存在越界读取,通过无效属性可触发此问题 (CVE-2021-39255)

- ntfs-3g:ntfs_inode_lookup_by_name() 中存在堆缓冲区溢出 (CVE-2021-39256)

- ntfs-3g:ntfs_attr_pwrite() 中存在无限递归,通过未分配的位图可触发此问题 (CVE-2021-39257)

- ntfs-3g:ntfs_attr_find() 和 ntfs_external_attr_find() 中存在越界读取 (CVE-2021-39258)

- ntfs-3g:ntfs_inode_lookup_by_name() 中存在越界访问,这是未经审查的属性长度所致 (CVE-2021-39259)

- ntfs-3g:ntfs_inode_sync_standard_information() 中存在越界访问 (CVE-2021-39260)

- ntfs-3g:ntfs_compressed_pwrite() 中存在堆缓冲区溢出 (CVE-2021-39261)

- ntfs-3g:ntfs_decompress() 中存在越界访问 (CVE-2021-39262)

- ntfs-3g:ntfs_get_attribute_value() 中存在堆缓冲区溢出,这是未经审查的属性所致 (CVE-2021-39263)

请注意,Nessus 尚未测试此问题,而是只依靠应用程序自我报告的版本号来判断。

解决方案

更新受影响的程序包。

另见

https://cwe.mitre.org/data/definitions/119.html

https://cwe.mitre.org/data/definitions/667.html

https://cwe.mitre.org/data/definitions/732.html

https://cwe.mitre.org/data/definitions/763.html

https://access.redhat.com/security/cve/CVE-2021-3631

https://access.redhat.com/security/cve/CVE-2021-3667

https://access.redhat.com/security/cve/CVE-2021-3682

https://access.redhat.com/security/cve/CVE-2021-33285

https://access.redhat.com/security/cve/CVE-2021-33286

https://access.redhat.com/security/cve/CVE-2021-33287

https://access.redhat.com/security/cve/CVE-2021-33289

https://access.redhat.com/security/cve/CVE-2021-35266

https://access.redhat.com/security/cve/CVE-2021-35267

https://access.redhat.com/security/cve/CVE-2021-35268

https://access.redhat.com/security/cve/CVE-2021-35269

https://access.redhat.com/security/cve/CVE-2021-39251

https://access.redhat.com/security/cve/CVE-2021-39252

https://access.redhat.com/security/cve/CVE-2021-39253

https://access.redhat.com/security/cve/CVE-2021-39254

https://access.redhat.com/security/cve/CVE-2021-39255

https://access.redhat.com/security/cve/CVE-2021-39256

https://access.redhat.com/security/cve/CVE-2021-39257

https://access.redhat.com/security/cve/CVE-2021-39258

https://access.redhat.com/security/cve/CVE-2021-39259

https://access.redhat.com/security/cve/CVE-2021-39260

https://access.redhat.com/security/cve/CVE-2021-39261

https://access.redhat.com/security/cve/CVE-2021-39262

https://access.redhat.com/security/cve/CVE-2021-39263

https://access.redhat.com/errata/RHSA-2021:3704

https://bugzilla.redhat.com/1977726

https://bugzilla.redhat.com/1986094

https://bugzilla.redhat.com/1989651

https://bugzilla.redhat.com/2001608

https://bugzilla.redhat.com/2001609

https://bugzilla.redhat.com/2001613

https://bugzilla.redhat.com/2001616

https://bugzilla.redhat.com/2001619

https://bugzilla.redhat.com/2001621

https://bugzilla.redhat.com/2001623

https://bugzilla.redhat.com/2001645

https://bugzilla.redhat.com/2001649

https://bugzilla.redhat.com/2001650

https://bugzilla.redhat.com/2001651

https://bugzilla.redhat.com/2001652

https://bugzilla.redhat.com/2001653

https://bugzilla.redhat.com/2001654

https://bugzilla.redhat.com/2001656

https://bugzilla.redhat.com/2001658

https://bugzilla.redhat.com/2001659

https://bugzilla.redhat.com/2001661

https://bugzilla.redhat.com/2001662

https://bugzilla.redhat.com/2001665

https://bugzilla.redhat.com/2001667

插件详情

严重性: High

ID: 153804

文件名: redhat-RHSA-2021-3704.nasl

版本: 1.2

类型: local

代理: unix

发布时间: 2021/10/1

最近更新时间: 2021/10/1

依存关系: ssh_get_info.nasl, redhat_repos.nasl

风险信息

CVSS 分数来源: CVE-2021-39263

VPR

风险因素: High

分数: 7.4

CVSS v2

风险因素: Medium

基本分数: 6.9

时间分数: 5.1

矢量: AV:L/AC:M/Au:N/C:C/I:C/A:C

时间矢量: E:U/RL:OF/RC:C

CVSS v3

风险因素: High

基本分数: 7.8

时间分数: 6.8

矢量: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

时间矢量: E:U/RL:O/RC:C

漏洞信息

CPE: cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:redhat:enterprise_linux:SLOF, p-cpe:/a:redhat:enterprise_linux:hivex, p-cpe:/a:redhat:enterprise_linux:hivex-devel, p-cpe:/a:redhat:enterprise_linux:libguestfs, p-cpe:/a:redhat:enterprise_linux:libguestfs-bash-completion, p-cpe:/a:redhat:enterprise_linux:libguestfs-benchmarking, p-cpe:/a:redhat:enterprise_linux:libguestfs-devel, p-cpe:/a:redhat:enterprise_linux:libguestfs-gfs2, p-cpe:/a:redhat:enterprise_linux:libguestfs-gobject, p-cpe:/a:redhat:enterprise_linux:libguestfs-gobject-devel, p-cpe:/a:redhat:enterprise_linux:libguestfs-inspect-icons, p-cpe:/a:redhat:enterprise_linux:libguestfs-java, p-cpe:/a:redhat:enterprise_linux:libguestfs-java-devel, p-cpe:/a:redhat:enterprise_linux:libguestfs-javadoc, p-cpe:/a:redhat:enterprise_linux:libguestfs-man-pages-ja, p-cpe:/a:redhat:enterprise_linux:libguestfs-man-pages-uk, p-cpe:/a:redhat:enterprise_linux:libguestfs-rescue, p-cpe:/a:redhat:enterprise_linux:libguestfs-rsync, p-cpe:/a:redhat:enterprise_linux:libguestfs-tools, p-cpe:/a:redhat:enterprise_linux:libguestfs-tools-c, p-cpe:/a:redhat:enterprise_linux:libguestfs-winsupport, p-cpe:/a:redhat:enterprise_linux:libguestfs-xfs, p-cpe:/a:redhat:enterprise_linux:libiscsi, p-cpe:/a:redhat:enterprise_linux:libiscsi-devel, p-cpe:/a:redhat:enterprise_linux:libiscsi-utils, p-cpe:/a:redhat:enterprise_linux:libnbd, p-cpe:/a:redhat:enterprise_linux:libnbd-devel, p-cpe:/a:redhat:enterprise_linux:libtpms, p-cpe:/a:redhat:enterprise_linux:libtpms-devel, p-cpe:/a:redhat:enterprise_linux:libvirt, p-cpe:/a:redhat:enterprise_linux:libvirt-admin, p-cpe:/a:redhat:enterprise_linux:libvirt-bash-completion, p-cpe:/a:redhat:enterprise_linux:libvirt-client, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-config-network, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-config-nwfilter, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-interface, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-network, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-nodedev, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-nwfilter, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-qemu, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-secret, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-core, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-disk, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-gluster, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-iscsi, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-iscsi-direct, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-logical, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-mpath, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-rbd, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-scsi, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-kvm, p-cpe:/a:redhat:enterprise_linux:libvirt-dbus, p-cpe:/a:redhat:enterprise_linux:libvirt-devel, p-cpe:/a:redhat:enterprise_linux:libvirt-docs, p-cpe:/a:redhat:enterprise_linux:libvirt-libs, p-cpe:/a:redhat:enterprise_linux:libvirt-lock-sanlock, p-cpe:/a:redhat:enterprise_linux:libvirt-nss, p-cpe:/a:redhat:enterprise_linux:lua-guestfs, p-cpe:/a:redhat:enterprise_linux:nbdfuse, p-cpe:/a:redhat:enterprise_linux:nbdkit, p-cpe:/a:redhat:enterprise_linux:nbdkit-bash-completion, p-cpe:/a:redhat:enterprise_linux:nbdkit-basic-filters, p-cpe:/a:redhat:enterprise_linux:nbdkit-basic-plugins, p-cpe:/a:redhat:enterprise_linux:nbdkit-curl-plugin, p-cpe:/a:redhat:enterprise_linux:nbdkit-devel, p-cpe:/a:redhat:enterprise_linux:nbdkit-example-plugins, p-cpe:/a:redhat:enterprise_linux:nbdkit-gzip-plugin, p-cpe:/a:redhat:enterprise_linux:nbdkit-linuxdisk-plugin, p-cpe:/a:redhat:enterprise_linux:nbdkit-python-plugin, p-cpe:/a:redhat:enterprise_linux:nbdkit-server, p-cpe:/a:redhat:enterprise_linux:nbdkit-ssh-plugin, p-cpe:/a:redhat:enterprise_linux:nbdkit-vddk-plugin, p-cpe:/a:redhat:enterprise_linux:nbdkit-xz-filter, p-cpe:/a:redhat:enterprise_linux:netcf, p-cpe:/a:redhat:enterprise_linux:netcf-devel, p-cpe:/a:redhat:enterprise_linux:netcf-libs, p-cpe:/a:redhat:enterprise_linux:ocaml-hivex, p-cpe:/a:redhat:enterprise_linux:ocaml-hivex-devel, p-cpe:/a:redhat:enterprise_linux:ocaml-libguestfs, p-cpe:/a:redhat:enterprise_linux:ocaml-libguestfs-devel, p-cpe:/a:redhat:enterprise_linux:ocaml-libnbd, p-cpe:/a:redhat:enterprise_linux:ocaml-libnbd-devel, p-cpe:/a:redhat:enterprise_linux:perl-Sys-Guestfs, p-cpe:/a:redhat:enterprise_linux:perl-Sys-Virt, p-cpe:/a:redhat:enterprise_linux:perl-hivex, p-cpe:/a:redhat:enterprise_linux:python3-hivex, p-cpe:/a:redhat:enterprise_linux:python3-libguestfs, p-cpe:/a:redhat:enterprise_linux:python3-libnbd, p-cpe:/a:redhat:enterprise_linux:python3-libvirt, p-cpe:/a:redhat:enterprise_linux:python3-pyvmomi, p-cpe:/a:redhat:enterprise_linux:qemu-guest-agent, p-cpe:/a:redhat:enterprise_linux:qemu-img, p-cpe:/a:redhat:enterprise_linux:qemu-kvm, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-block-curl, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-block-gluster, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-block-iscsi, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-block-rbd, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-block-ssh, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-common, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-core, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-tests, p-cpe:/a:redhat:enterprise_linux:ruby-hivex, p-cpe:/a:redhat:enterprise_linux:ruby-libguestfs, p-cpe:/a:redhat:enterprise_linux:seabios, p-cpe:/a:redhat:enterprise_linux:seabios-bin, p-cpe:/a:redhat:enterprise_linux:seavgabios-bin, p-cpe:/a:redhat:enterprise_linux:sgabios, p-cpe:/a:redhat:enterprise_linux:sgabios-bin, p-cpe:/a:redhat:enterprise_linux:supermin, p-cpe:/a:redhat:enterprise_linux:supermin-devel, p-cpe:/a:redhat:enterprise_linux:swtpm, p-cpe:/a:redhat:enterprise_linux:swtpm-devel, p-cpe:/a:redhat:enterprise_linux:swtpm-libs, p-cpe:/a:redhat:enterprise_linux:swtpm-tools, p-cpe:/a:redhat:enterprise_linux:virglrenderer, p-cpe:/a:redhat:enterprise_linux:virglrenderer-devel, p-cpe:/a:redhat:enterprise_linux:virglrenderer-test-server, p-cpe:/a:redhat:enterprise_linux:virt-dib, p-cpe:/a:redhat:enterprise_linux:virt-v2v

必需的 KB 项: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

易利用性: No known exploits are available

补丁发布日期: 2021/9/30

漏洞发布日期: 2021/8/5

参考资料信息

CVE: CVE-2021-3631, CVE-2021-3667, CVE-2021-3682, CVE-2021-33285, CVE-2021-33286, CVE-2021-33287, CVE-2021-33289, CVE-2021-35266, CVE-2021-35267, CVE-2021-35268, CVE-2021-35269, CVE-2021-39251, CVE-2021-39252, CVE-2021-39253, CVE-2021-39254, CVE-2021-39255, CVE-2021-39256, CVE-2021-39257, CVE-2021-39258, CVE-2021-39259, CVE-2021-39260, CVE-2021-39261, CVE-2021-39262, CVE-2021-39263

RHSA: 2021:3704

CWE: 119, 667, 732, 763