Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2021:5238

Опубликовано: 21 дек. 2021
Источник: rocky
Оценка: Low

Описание

Low: virt:rhel and virt-devel:rhel security update

Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.

Security Fix(es):

  • QEMU: off-by-one error in mode_sense_page() in hw/scsi/scsi-disk.c (CVE-2021-3930)

  • QEMU: net: e1000: infinite loop while processing transmit descriptors (CVE-2021-20257)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
libiscsix86_648.module+el8.7.0+1084+97b81f61libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
libiscsi-develx86_648.module+el8.7.0+1084+97b81f61libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
libiscsi-utilsx86_648.module+el8.7.0+1084+97b81f61libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
libvirt-dbusx86_642.module+el8.7.0+1084+97b81f61libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
netcfx86_6412.module+el8.7.0+1084+97b81f61netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
netcf-develx86_6412.module+el8.7.0+1084+97b81f61netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
netcf-libsx86_6412.module+el8.7.0+1084+97b81f61netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

oracle-oval
больше 3 лет назад

ELSA-2021-5238: virt:ol and virt-devel:rhel security update (LOW)

oracle-oval
больше 3 лет назад

ELSA-2021-9638: qemu security update (IMPORTANT)

CVSS3: 6.5
ubuntu
больше 3 лет назад

An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page() if the 'page' argument was set to MODE_PAGE_ALLS (0x3f). A malicious guest could use this flaw to potentially crash QEMU, resulting in a denial of service condition.

CVSS3: 3.2
redhat
больше 4 лет назад

An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page() if the 'page' argument was set to MODE_PAGE_ALLS (0x3f). A malicious guest could use this flaw to potentially crash QEMU, resulting in a denial of service condition.

CVSS3: 6.5
nvd
больше 3 лет назад

An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page() if the 'page' argument was set to MODE_PAGE_ALLS (0x3f). A malicious guest could use this flaw to potentially crash QEMU, resulting in a denial of service condition.