USN-6167-1: QEMU vulnerabilities
23971
29 June 2023
29 June 2023
CLOSED
MEDIUM
CVE-2022-1050,CVE-2022-4144,CVE-2022-4172,CVE-2023-0330
Severity
medium
Vendor
VMware Tanzu
Versions Affected
- Canonical Ubuntu 16.04
- Canonical Ubuntu 22.04
Description
It was discovered that QEMU did not properly manage the guest drivers when shared buffers are not allocated. A malicious guest driver could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2022-1050) It was discovered that QEMU did not properly check the size of the structure pointed to by the guest physical address pqxl. A malicious guest attacker could use this issue to cause QEMU to crash, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2022-4144) It was discovered that QEMU did not properly manage memory in the ACPI Error Record Serialization Table (ERST) device. A malicious guest attacker could use this issue to cause QEMU to crash, resulting in a denial of service. This issue only affected Ubuntu 22.10. (CVE-2022-4172) It was discovered that QEMU did not properly manage memory when DMA memory writes happen repeatedly in the lsi53c895a device. A malicious guest attacker could use this issue to cause QEMU to crash, resulting in a denial of service. (CVE-2023-0330) Update Instructions: Run `sudo pro fix USN-6167-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: qemu-system-common - 1:2.5+dfsg-5ubuntu10.51+esm2 qemu-user-static - 1:2.5+dfsg-5ubuntu10.51+esm2 qemu-system-s390x - 1:2.5+dfsg-5ubuntu10.51+esm2 qemu-utils - 1:2.5+dfsg-5ubuntu10.51+esm2 qemu-block-extra - 1:2.5+dfsg-5ubuntu10.51+esm2 qemu-kvm - 1:2.5+dfsg-5ubuntu10.51+esm2 qemu-user - 1:2.5+dfsg-5ubuntu10.51+esm2 qemu-guest-agent - 1:2.5+dfsg-5ubuntu10.51+esm2 qemu-system - 1:2.5+dfsg-5ubuntu10.51+esm2 qemu-system-misc - 1:2.5+dfsg-5ubuntu10.51+esm2 qemu-system-aarch64 - 1:2.5+dfsg-5ubuntu10.51+esm2 qemu - 1:2.5+dfsg-5ubuntu10.51+esm2 qemu-user-binfmt - 1:2.5+dfsg-5ubuntu10.51+esm2 qemu-system-x86 - 1:2.5+dfsg-5ubuntu10.51+esm2 qemu-system-sparc - 1:2.5+dfsg-5ubuntu10.51+esm2 qemu-system-arm - 1:2.5+dfsg-5ubuntu10.51+esm2 qemu-system-ppc - 1:2.5+dfsg-5ubuntu10.51+esm2 qemu-system-mips - 1:2.5+dfsg-5ubuntu10.51+esm2 Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro
CVEs contained in this USN include: CVE-2022-1050, CVE-2022-4144, CVE-2022-4172, CVE-2023-0330
Affected VMware Products and Versions
Severity is medium unless otherwise noted.
- Operations Manager
- 2.10.x versions prior to 2.10.59
- 3.0.x versions prior to 3.0.11+LTS-T
Mitigation
Users of affected products are strongly encouraged to follow the mitigation below. On the Tanzu Network product page for each release, check the Depends On section and/or Release Notes for this information. Releases that have fixed this issue include:- Operations Manager
- 2.10.59
- 3.0.11+LTS-T
References
- https://ubuntu.com/security/CVE-2022-1050
- https://ubuntu.com/security/CVE-2022-4144
- https://ubuntu.com/security/CVE-2022-4172
- https://ubuntu.com/security/CVE-2023-0330
- https://ubuntu.com/security/notices/USN-6167-1
History
2023-06-29: Initial vulnerability report published.