Описание
Low: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
The following packages have been upgraded to a later upstream version: qemu-kvm (6.2.0). (BZ#2066828)
Security Fix(es):
-
QEMU: fdc: heap buffer overflow in DMA read data transfers (CVE-2021-3507)
-
libvirt: missing locking in nwfilterConnectNumOfNWFilters can lead to denial of service (CVE-2022-0897)
-
libguestfs: Buffer overflow in get_keys leads to DoS (CVE-2022-2211)
-
swtpm: Unchecked header size indicator against expected size (CVE-2022-23645)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Затронутые продукты
Rocky Linux 8
Ссылки на источники
Исправления
- Red Hat - 1519071
- Red Hat - 1851227
- Red Hat - 1951118
- Red Hat - 1985827
- Red Hat - 2028823
- Red Hat - 2029980
- Red Hat - 2051332
- Red Hat - 2056491
- Red Hat - 2060843
- Red Hat - 2062610
- Red Hat - 2062611
- Red Hat - 2063883
- Red Hat - 2066828
- Red Hat - 2067118
- Red Hat - 2067126
- Red Hat - 2069946
- Red Hat - 2070417
- Red Hat - 2071070
- Red Hat - 2072049
- Red Hat - 2072377
Связанные уязвимости
ELSA-2022-7472: virt:ol and virt-devel:ol security, bug fix, and enhancement update (LOW)
A heap buffer overflow was found in the floppy disk emulator of QEMU up to 6.0.0 (including). It could occur in fdctrl_transfer_handler() in hw/block/fdc.c while processing DMA read data transfers from the floppy drive to the guest system. A privileged guest user could use this flaw to crash the QEMU process on the host resulting in DoS scenario, or potential information leakage from the host memory.
A heap buffer overflow was found in the floppy disk emulator of QEMU up to 6.0.0 (including). It could occur in fdctrl_transfer_handler() in hw/block/fdc.c while processing DMA read data transfers from the floppy drive to the guest system. A privileged guest user could use this flaw to crash the QEMU process on the host resulting in DoS scenario, or potential information leakage from the host memory.
A heap buffer overflow was found in the floppy disk emulator of QEMU up to 6.0.0 (including). It could occur in fdctrl_transfer_handler() in hw/block/fdc.c while processing DMA read data transfers from the floppy drive to the guest system. A privileged guest user could use this flaw to crash the QEMU process on the host resulting in DoS scenario, or potential information leakage from the host memory.
A heap buffer overflow was found in the floppy disk emulator of QEMU u ...