Описание
Moderate: virt:rhel and virt-devel:rhel security and enhancement update
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
-
QEMU: VNC: infinite loop in inflate_buffer() leads to denial of service (CVE-2023-3255)
-
QEMU: improper IDE controller reset can lead to MBR overwrite (CVE-2023-5088)
-
QEMU: VNC: NULL pointer dereference in qemu_clipboard_request() (CVE-2023-6683)
-
QEMU: virtio-net: stack buffer overflow in virtio_net_flush_tx() (CVE-2023-6693)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Затронутые продукты
Rocky Linux 8
Связанные CVE
Ссылки на источники
Исправления
- Red Hat - 2218486
- Red Hat - 2247283
- Red Hat - 2254580
- Red Hat - 2254825
Связанные уязвимости
ELSA-2024-2962: virt:ol and virt-devel:rhel security and enhancement update (MODERATE)
A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. A wrong exit condition may lead to an infinite loop when inflating an attacker controlled zlib buffer in the `inflate_buffer` function. This could allow a remote authenticated client who is able to send a clipboard to the VNC server to trigger a denial of service.