Lucene search

K
oraclelinuxOracleLinuxELSA-2021-3061
HistoryAug 12, 2021 - 12:00 a.m.

virt:ol and virt-devel:rhel security and bug fix update

2021-08-1200:00:00
linux.oracle.com
22

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:N/A:P

hivex
[1.3.18-21]

  • Bounds check for block exceeding page length (CVE-2021-3504)
    resolves: rhbz#1950501
    libvirt
    [6.0.0-35.1.0.1]
  • Set SOURCE_DATE_EPOCH from changelog [Orabug: 32019554]
  • Add runtime deps for pkg librbd1 >= 1:10.2.5 (Keshav Sharma)
  • Disable parallel builds (Karl Heubaum)
    [6.0.0-35.1.el8]
  • network: make it safe to call networkSetupPrivateChains() multiple times (rhbz#1958301)
  • network: force re-creation of iptables private chains on firewalld restart (rhbz#1958301)
    qemu-kvm
    [4.2.0-48.el8_4.3]
  • kvm-net-introduce-qemu_receive_packet.patch [bz#1932917]
  • kvm-e1000-switch-to-use-qemu_receive_packet-for-loopback.patch [bz#1932917]
  • kvm-dp8393x-switch-to-use-qemu_receive_packet-for-loopba.patch [bz#1932917]
  • kvm-sungem-switch-to-use-qemu_receive_packet-for-loopbac.patch [bz#1932917]
  • kvm-tx_pkt-switch-to-use-qemu_receive_packet_iov-for-loo.patch [bz#1932917]
  • kvm-rtl8139-switch-to-use-qemu_receive_packet-for-loopba.patch [bz#1932917]
  • kvm-pcnet-switch-to-use-qemu_receive_packet-for-loopback.patch [bz#1932917]
  • kvm-cadence_gem-switch-to-use-qemu_receive_packet-for-lo.patch [bz#1932917]
  • kvm-lan9118-switch-to-use-qemu_receive_packet-for-loopba.patch [bz#1932917]
  • Resolves: bz#1932917
    (CVE-2021-3416 virt:rhel/qemu-kvm: QEMU: net: infinite loop in loopback mode may lead to stack overflow [rhel-8.4.z])
    [4.2.0-48.el8_4.2]
  • kvm-pc-bios-s390-ccw-fix-off-by-one-error.patch [bz#1975679]
  • kvm-pc-bios-s390-ccw-break-loop-if-a-null-block-number-i.patch [bz#1975679]
  • kvm-pc-bios-s390-ccw-don-t-try-to-read-the-next-block-if.patch [bz#1975679]
  • Resolves: bz#1975679
    (RHEL8.4 Nightly[0322] - KVM guest fails to find zipl boot menu index (qemu-kvm) [rhel-8.4.0.z])
    [4.2.0-48.el8_4]
  • kvm-net-remove-an-assert-call-in-eth_get_gso_type.patch [bz#1939494]
  • kvm-libqos-usb-hcd-ehci-use-32-bit-write-for-config-regi.patch [bz#1944621]
  • kvm-libqos-pci-pc-use-32-bit-write-for-EJ-register.patch [bz#1944621]
  • kvm-memory-Revert-memory-accept-mismatching-sizes-in-mem.patch [bz#1944621]
  • kvm-acpi-accept-byte-and-word-access-to-core-ACPI-regist.patch [bz#1944621]
  • kvm-xhci-fix-valid.max_access_size-to-access-address-reg.patch [bz#1944621]
  • kvm-softmmu-memory-Log-invalid-memory-accesses.patch [bz#1944621]
  • kvm-hw-intc-arm_gic-Fix-interrupt-ID-in-GICD_SGIR-regist.patch [bz#1952986]
  • Resolves: bz#1939494
    (CVE-2020-27617 virt:rhel/qemu-kvm: QEMU: net: an assert failure via eth_get_gso_type [rhel-8.4.0.z])
  • Resolves: bz#1944621
    (CVE-2020-13754 virt:rhel/qemu-kvm: QEMU: msix: OOB access during mmio operations may lead to DoS [rhel-8.4.0.z])
  • Resolves: bz#1952986
    (CVE-2021-20221 virt:rhel/qemu-kvm: qemu: out-of-bound heap buffer access via an interrupt ID field [rhel-8.4.0.z])

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:N/A:P