[Debian] High CVE: CVE-2020-14394/CVE-2021-20196/.../CVE-2023-3301/CVE-2023-3354 qemu: multiple CVEs

Bug #2038888 reported by Yue Tao
256
This bug affects 1 person
Affects Status Importance Assigned to Milestone
StarlingX
Fix Released
High
Zhixiong Chi

Bug Description

CVE-2020-14394: https://nvd.nist.gov/vuln/detail/CVE-2020-14394

An infinite loop flaw was found in the USB xHCI controller emulation of QEMU while computing the length of the Transfer Request Block (TRB) Ring. This flaw allows a privileged guest user to hang the QEMU process on the host, resulting in a denial of service.

CVE-2021-20196: https://nvd.nist.gov/vuln/detail/CVE-2021-20196

A NULL pointer dereference flaw was found in the floppy disk emulator of QEMU. This issue occurs while processing read/write ioport commands if the selected floppy drive is not initialized with a block device. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.

CVE-2021-20203: https://nvd.nist.gov/vuln/detail/CVE-2021-20203

An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.

CVE-2021-3507: https://nvd.nist.gov/vuln/detail/CVE-2021-3507

A heap buffer overflow was found in the floppy disk emulator of QEMU up to 6.0.0 (including). It could occur in fdctrl_transfer_handler() in hw/block/fdc.c while processing DMA read data transfers from the floppy drive to the guest system. A privileged guest user could use this flaw to crash the QEMU process on the host resulting in DoS scenario, or potential information leakage from the host memory.

CVE-2021-3930: https://nvd.nist.gov/vuln/detail/CVE-2021-3930

An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page() if the 'page' argument was set to MODE_PAGE_ALLS (0x3f). A malicious guest could use this flaw to potentially crash QEMU, resulting in a denial of service condition.

CVE-2022-0216: https://nvd.nist.gov/vuln/detail/CVE-2022-0216

A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service.

CVE-2023-0330: https://nvd.nist.gov/vuln/detail/CVE-2023-0330

A vulnerability in the lsi53c895a device affects the latest version of qemu. A DMA-MMIO reentrancy problem may lead to memory corruption bugs like stack overflow or use-after-free.

CVE-2023-1544: https://nvd.nist.gov/vuln/detail/CVE-2023-1544

A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. This flaw allows a crafted guest driver to allocate and initialize a huge number of page tables to be used as a ring of descriptors for CQ and async events, potentially leading to an out-of-bounds read and crash of QEMU.

CVE-2023-3180: https://nvd.nist.gov/vuln/detail/CVE-2023-3180

A flaw was found in the QEMU virtual crypto device while handling data encryption/decryption requests in virtio_crypto_handle_sym_req. There is no check for the value of `src_len` and `dst_len` in virtio_crypto_sym_op_helper, potentially leading to a heap buffer overflow when the two values differ.

CVE-2023-3301: https://nvd.nist.gov/vuln/detail/CVE-2023-3301

A flaw was found in QEMU. The async nature of hot-unplug enables a race scenario where the net device backend is cleared before the virtio-net pci frontend has been unplugged. A malicious guest could use this time window to trigger an assertion and cause a denial of service.

CVE-2023-3354: https://nvd.nist.gov/vuln/detail/CVE-2023-3354

A flaw was found in the QEMU built-in VNC server. When a client connects to the VNC server, QEMU checks whether the current number of connections crosses a certain threshold and if so, cleans up the previous connection. If the previous connection happens to be in the handshake phase and fails, QEMU cleans up the connection again, resulting in a NULL pointer dereference issue. This could allow a remote unauthenticated client to cause a denial of service.

Base Score: High

Reference:

qemu_1:5.2+dfsg-11+deb11u3

Changed in starlingx:
assignee: nobody → Zhixiong Chi (zhixiongchi)
status: Triaged → In Progress
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to virt (master)

Fix proposed to branch: master
Review: https://review.opendev.org/c/starlingx/virt/+/899132

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to tools (master)

Fix proposed to branch: master
Review: https://review.opendev.org/c/starlingx/tools/+/899353

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to tools (master)

Reviewed: https://review.opendev.org/c/starlingx/tools/+/899353
Committed: https://opendev.org/starlingx/tools/commit/49951854f3c666c4834038dd3d16e7692e7dc586
Submitter: "Zuul (22348)"
Branch: master

commit 49951854f3c666c4834038dd3d16e7692e7dc586
Author: Zhixiong Chi <email address hidden>
Date: Tue Oct 24 22:04:33 2023 -0400

    qemu: Upgrade to 1:5.2+dfsg-11+deb11u3

    Upgrade qemu to 1:5.2+dfsg-11+deb11u3 to fix the following CVEs:
    CVE-2020-14394/CVE-2021-20196/CVE-2021-20203/CVE-2021-3507/
    CVE-2021-3930/CVE-2022-0216/CVE-2023-0330/CVE-2023-1544/
    CVE-2023-3180/CVE-2023-3301/CVE-2023-3354

    Refer to:
    https://nvd.nist.gov/vuln/detail/CVE-2020-14394
    https://nvd.nist.gov/vuln/detail/CVE-2021-20196
    https://nvd.nist.gov/vuln/detail/CVE-2021-20203
    https://nvd.nist.gov/vuln/detail/CVE-2021-3507
    https://nvd.nist.gov/vuln/detail/CVE-2021-3930
    https://nvd.nist.gov/vuln/detail/CVE-2022-0216
    https://nvd.nist.gov/vuln/detail/CVE-2023-0330
    https://nvd.nist.gov/vuln/detail/CVE-2023-1544
    https://nvd.nist.gov/vuln/detail/CVE-2023-3180
    https://nvd.nist.gov/vuln/detail/CVE-2023-3301
    https://nvd.nist.gov/vuln/detail/CVE-2023-3354

    Test Plan:
    Pass: downloader
    Pass: build-pkgs --clean --all
    Pass: build-image
    Pass: boot

    Closes-Bug: 2038888

    Signed-off-by: Zhixiong Chi <email address hidden>
    Change-Id: Idc55c98ca63ae734d787e6bb6b744bd0e0d1b1bc

Changed in starlingx:
status: In Progress → Fix Released
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to virt (master)

Reviewed: https://review.opendev.org/c/starlingx/virt/+/899132
Committed: https://opendev.org/starlingx/virt/commit/197a477c454bdf9f7c6b5d09a0b822b9365b7075
Submitter: "Zuul (22348)"
Branch: master

commit 197a477c454bdf9f7c6b5d09a0b822b9365b7075
Author: Zhixiong Chi <email address hidden>
Date: Mon Oct 23 17:59:24 2023 +0800

    qemu: Upgrade to 1:5.2+dfsg-11+deb11u3

    Upgrade qemu to 1:5.2+dfsg-11+deb11u3 to fix the following CVEs:
    CVE-2020-14394/CVE-2021-20196/CVE-2021-20203/CVE-2021-3507/
    CVE-2021-3930/CVE-2022-0216/CVE-2023-0330/CVE-2023-1544/
    CVE-2023-3180/CVE-2023-3301/CVE-2023-3354

    Refer to:
    https://nvd.nist.gov/vuln/detail/CVE-2020-14394
    https://nvd.nist.gov/vuln/detail/CVE-2021-20196
    https://nvd.nist.gov/vuln/detail/CVE-2021-20203
    https://nvd.nist.gov/vuln/detail/CVE-2021-3507
    https://nvd.nist.gov/vuln/detail/CVE-2021-3930
    https://nvd.nist.gov/vuln/detail/CVE-2022-0216
    https://nvd.nist.gov/vuln/detail/CVE-2023-0330
    https://nvd.nist.gov/vuln/detail/CVE-2023-1544
    https://nvd.nist.gov/vuln/detail/CVE-2023-3180
    https://nvd.nist.gov/vuln/detail/CVE-2023-3301
    https://nvd.nist.gov/vuln/detail/CVE-2023-3354

    Test Plan:
    Pass: downloader
    Pass: build-pkgs --clean --all
    Pass: build-image
    Pass: boot

    Closes-Bug: 2038888

    Change-Id: I1029855b2b14a33890c53376b7becf5af74bd067
    Signed-off-by: Zhixiong Chi <email address hidden>

To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.