Lucene search
Basic search
Lucene search
Search by product
Subscribe
K
Start 30-day trial
Database
Vendors
Products
Years
CVSS
Scanner
Agent Scanning
API Scanning
Manual Audit
Perimeter Scanner
Scanning
Projects
Email
Webhook
Plugins
Resources
Documents
Blog
Glossary
FAQ
Pricing
Contacts
About Us
Partners
Branding Guideline
SIGN IN
OracleLinux
ELSA-2022-1759
History
May 17, 2022 - 12:00 a.m.
Vulners
/
Oraclelinux
/
virt:ol and virt-devel:ol security, bug fix, and enhancement update
virt:ol and virt-devel:ol security, bug fix, and enhancement update
2022-05-17
00:00:00
linux.oracle.com
54
security update
bug fix
enhancement
rebase
cve-2021-3622
cve-2021-33285
cve-2021-33286
cve-2021-33287
cve-2021-33289
cve-2021-35266
cve-2021-35267
cve-2021-35268
cve-2021-35269
cve-2021-39251
cve-2021-39252
cve-2021-39253
cve-2021-39254
cve-2022-0485
rhel-8.6
win11
EPSS
0.002
Percentile
56.2%
JSON
hivex
[1.3.18-23]
Limit recursion in ri-records (CVE-2021-3622)
resolves: rhbz#1976194
[1.3.18-22.el8]
Resolves: bz#2000225
(Rebase virt:rhel module:stream based on AV-8.6)
libguestfs
[1.44.0-5.0.1]
Replace upstream references from description tag
Config supermin to use host yum.conf in ol8 [Orabug: 29319324]
Set DISTRO_ORACLE_LINUX correspeonding to ol
[1:1.44.0-5]
Fix libguestfs failure with qemu 6.2, libvirt 7.10
resolves: rhbz#2035177
[1:1.44.0-4]
Autodetect backing format for qemu-img create -b
Move appliance to separate subpackage
Read rpm database through librpm
resolves: rhbz#2013916, rhbz#1989520, rhbz#1836094
[1.44.0-3.el8]
Resolves: bz#2000225
(Rebase virt:rhel module:stream based on AV-8.6)
libguestfs-winsupport
[8.6-1]
Rebase to ntfs-3g 2021.8.22
Fixes: CVE-2021-33285, CVE-2021-33286, CVE-2021-33287, CVE-2021-33289,
CVE-2021-35266, CVE-2021-35267, CVE-2021-35268, CVE-2021-35269,
CVE-2021-39251, CVE-2021-39252, CVE-2021-39253, CVE-2021-39254
resolves: rhbz#2004490
libnbd
[1.6.0-5.el8]
Fix CVE-2022-0485: Fail nbdcopy if NBD read or write fails
resolves: rhbz#2045718
[1.6.0-4.el8]
Resolves: bz#2000225
(Rebase virt:rhel module:stream based on AV-8.6)
[1.2.2]
Resolves: bz#1844296
(Upgrade components in virt:rhel module:stream for RHEL-8.3 release)
libvirt
[8.0.0-5.0.1]
Set SOURCE_DATE_EPOCH from changelog [Orabug: 32019554]
Add runtime deps for pkg librbd1 >= 1:10.2.5 (Keshav Sharma)
[8.0.0-5]
node_device: Rework udevKludgeStorageType() (rhbz#2056673)
node_device: Treat NVMe disks as regular disks (rhbz#2056673)
[8.0.0-4]
qemu_command: Generate memory only after controllers (rhbz#2050697)
qemu: Validate domain definition even on migration (rhbz#2050702)
[8.0.0-3]
qemuDomainSetupDisk: Initialize ‘targetPaths’ (rhbz#2046172)
RHEL: Remove
[8.0.0-2]
Revert ‘report error when virProcessGetStatInfo() is unable to parse data’ (rhbz#2041610)
qemu: fix inactive snapshot revert (rhbz#2043584)
[8.0.0-1]
Rebased to libvirt-8.0.0 (rhbz#2012802)
libvirt-python
[8.0.0-1]
Rebased to libvirt-python-8.0.0 (rhbz#2012806)
perl-Sys-Virt
[8.0.0-1]
Rebase to 8.0.0 release
Resolves: rhbz#2012813
qemu-kvm
[6.2.0-11]
kvm-target-i386-properly-reset-TSC-on-reset.patch [bz#1975840]
Resolves: bz#1975840
(Windows guest hangs after updating and restarting from the guest OS)
[6.2.0-10]
kvm-vmxcap-Add-5-level-EPT-bit.patch [bz#2056986]
kvm-i386-Add-Icelake-Server-v6-CPU-model-with-5-level-EP.patch [bz#2056986]
kvm-acpi-fix-QEMU-crash-when-started-with-SLIC-table.patch [bz#2059311]
kvm-tests-acpi-whitelist-expected-blobs-before-changing-.patch [bz#2059311]
kvm-tests-acpi-add-SLIC-table-test.patch [bz#2059311]
kvm-tests-acpi-SLIC-update-expected-blobs.patch [bz#2059311]
kvm-tests-acpi-manually-pad-OEM_ID-OEM_TABLE_ID-for-test.patch [bz#2059311]
kvm-tests-acpi-whitelist-nvdimm-s-SSDT-and-FACP.slic-exp.patch [bz#2059311]
kvm-acpi-fix-OEM-ID-OEM-Table-ID-padding.patch [bz#2059311]
kvm-tests-acpi-update-expected-blobs.patch [bz#2059311]
kvm-tests-acpi-test-short-OEM_ID-OEM_TABLE_ID-values-in-.patch [bz#2059311]
kvm-rhel-workaround-for-lack-of-binary-patches-in-SRPM.patch [bz#2059311]
Resolves: bz#2056986
(Win11 (q35+edk2) guest broke after install wsl2 through ‘wsl --install -d Ubuntu-20.04’)
Resolves: bz#2059311
(Guest can not start with SLIC acpi table)
[6.2.0-9]
kvm-Revert-redhat-Add-hw_compat_4_2_extra-and-apply-to-u.patch [bz#2061856]
kvm-Revert-redhat-Enable-FDC-device-for-upstream-machine.patch [bz#2061856]
kvm-Revert-redhat-Expose-upstream-machines-pc-4.2-and-pc.patch [bz#2061856]
kvm-hw-virtio-vdpa-Fix-leak-of-host-notifier-memory-regi.patch [bz#2027208]
kvm-pci-expose-TYPE_XIO3130_DOWNSTREAM-name.patch [bz#2054597]
kvm-acpi-pcihp-pcie-set-power-on-cap-on-parent-slot.patch [bz#2054597]
Resolves: bz#2061856
(Revert IBM-specific Ubuntu-compatibility machine type for 8.6-AV GA)
Resolves: bz#2027208
([virtual network][vDPA] qemu crash after hot unplug vdpa device)
Resolves: bz#2054597
(Do operation to disk will hang in the guest of target host after hotplugging and migrating)
[6.2.0-8]
kvm-block-nbd-Delete-reconnect-delay-timer-when-done.patch [bz#2035185]
kvm-block-nbd-Assert-there-are-no-timers-when-closed.patch [bz#2035185]
kvm-iotests.py-Add-QemuStorageDaemon-class.patch [bz#2035185]
kvm-iotests-281-Test-lingering-timers.patch [bz#2035185]
kvm-block-nbd-Move-s-ioc-on-AioContext-change.patch [bz#2035185]
kvm-iotests-281-Let-NBD-connection-yield-in-iothread.patch [bz#2035185]
Resolves: bz#2035185
(Qemu core dump when start guest with nbd node or do block jobs to nbd node)
[6.2.0-7]
kvm-numa-Enable-numa-for-SGX-EPC-sections.patch [bz#1518984]
kvm-numa-Support-SGX-numa-in-the-monitor-and-Libvirt-int.patch [bz#1518984]
kvm-doc-Add-the-SGX-numa-description.patch [bz#1518984]
kvm-Enable-SGX-RH-Only.patch [bz#1518984]
kvm-qapi-Cleanup-SGX-related-comments-and-restore-sectio.patch [bz#1518984]
kvm-block-io-Update-BSC-only-if-want_zero-is-true.patch [bz#2041480]
kvm-iotests-block-status-cache-New-test.patch [bz#2041480]
Resolves: bz#1518984
([Intel 8.6 Feat] qemu-kvm: SGX 1.5 (SGX1 + Flexible Launch Control) support)
Resolves: bz#2041480
([incremental_backup] Inconsistent block status reply in qemu-nbd)
[6.2.0-6]
kvm-virtiofsd-Drop-membership-of-all-supplementary-group.patch [bz#2046198]
kvm-softmmu-fix-device-deletion-events-with-device-JSON-.patch [bz#2033279]
kvm-block-backend-prevent-dangling-BDS-pointers-across-a.patch [bz#2021778 bz#2036178]
kvm-iotests-stream-error-on-reset-New-test.patch [bz#2021778 bz#2036178]
kvm-block-rbd-fix-handling-of-holes-in-.bdrv_co_block_st.patch [bz#2037135]
kvm-block-rbd-workaround-for-ceph-issue-53784.patch [bz#2037135]
Resolves: bz#2046198
(CVE-2022-0358 virt:av/qemu-kvm: QEMU: virtiofsd: potential privilege escalation via CVE-2018-13405 [rhel-8.6])
Resolves: bz#2033279
([wrb][qemu-kvm 6.2] The hot-unplugged device can not be hot-plugged back)
Resolves: bz#2021778
(Qemu core dump when do full backup during system reset)
Resolves: bz#2036178
(Qemu core dumped when do block-stream to a snapshot node on non-enough space storage)
Resolves: bz#2037135
(Booting from Local Snapshot Core Dumped Whose Backing File Is Based on RBD)
[6.2.0-5]
kvm-acpi-validate-hotplug-selector-on-access.patch [bz#2036580]
kvm-x86-Add-q35-RHEL-8.6.0-machine-type.patch [bz#2031035]
Resolves: bz#2036580
(CVE-2021-4158 virt:rhel/qemu-kvm: QEMU: NULL pointer dereference in pci_write() in hw/acpi/pcihp.c [rhel-8])
Resolves: bz#2031035
(Add rhel-8.6.0 machine types for RHEL 8.6 [x86])
[6.2.0-4]
kvm-hw-arm-virt-Register-iommu-as-a-class-property.patch [bz#2031039]
kvm-hw-arm-virt-Register-its-as-a-class-property.patch [bz#2031039]
kvm-hw-arm-virt-Rename-default_bus_bypass_iommu.patch [bz#2031039]
kvm-hw-arm-virt-Add-8.6-machine-type.patch [bz#2031039]
kvm-hw-arm-virt-Check-no_tcg_its-and-minor-style-changes.patch [bz#2031039]
kvm-rhel-machine-types-x86-set-prefer_sockets.patch [bz#2029582]
Resolves: bz#2031039
(Add rhel-8.6.0 machine types for RHEL 8.6 [aarch64])
Resolves: bz#2029582
([8.6] machine types: 6.2: Fix prefer_sockets)
[6.2.0-2]
kvm-redhat-Add-rhel8.6.0-machine-type-for-s390x.patch [bz#2005325]
kvm-redhat-Define-pseries-rhel8.6.0-machine-type.patch [bz#2031041]
Resolves: bz#2005325
(Fix CPU Model for new IBM Z Hardware - qemu part)
Resolves: bz#2031041
(Add rhel-8.6.0 machine types for RHEL 8.6 [ppc64le])
[6.2.0-1.el8]
Rebase to qemu-kvm 6.2.0
Resolves bz#2027716
Affected Package
OS
Version
Architecture
Package
Version
Filename
oracle linux
8
src
hivex
<Â 1.3.18-23.module
hivex-1.3.18-23.module+el8.6.0+20659+3dcf7c70.src.rpm
oracle linux
8
src
libguestfs
<Â 1.44.0-5.0.1.module
libguestfs-1.44.0-5.0.1.module+el8.6.0+20659+3dcf7c70.src.rpm
oracle linux
8
src
libguestfs-winsupport
<Â 8.6-1.module
libguestfs-winsupport-8.6-1.module+el8.6.0+20659+3dcf7c70.src.rpm
oracle linux
8
src
libiscsi
<Â 1.18.0-8.module
libiscsi-1.18.0-8.module+el8.6.0+20659+3dcf7c70.src.rpm
oracle linux
8
src
libnbd
<Â 1.6.0-5.module
libnbd-1.6.0-5.module+el8.6.0+20664+3dcf7c70.src.rpm
oracle linux
8
src
libtpms
<Â 0.9.1-0.20211126git1ff6fe1f43.module
libtpms-0.9.1-0.20211126git1ff6fe1f43.module+el8.6.0+20659+3dcf7c70.src.rpm
oracle linux
8
src
libvirt
<Â 8.0.0-5.0.1.module
libvirt-8.0.0-5.0.1.module+el8.6.0+20659+3dcf7c70.src.rpm
oracle linux
8
src
libvirt-dbus
<Â 1.3.0-2.module
libvirt-dbus-1.3.0-2.module+el8.6.0+20659+3dcf7c70.src.rpm
oracle linux
8
src
libvirt-python
<Â 8.0.0-1.module
libvirt-python-8.0.0-1.module+el8.6.0+20659+3dcf7c70.src.rpm
oracle linux
8
src
nbdkit
<Â 1.24.0-4.module
nbdkit-1.24.0-4.module+el8.6.0+20659+3dcf7c70.src.rpm
Rows per page:
10
​
1-10 of 324
1
Related
almalinux 1
osv 25
redhat 4
openvas 9
mageia 1
nessus 20
debian 3
altlinux 1
rocky 1
slackware 1
suse 3
fedora 2
gentoo 1
ubuntucve 13
nvd 13
cbl_mariner 12
cnvd 13
prion 10
alpinelinux 10
cvelist 10
debiancve 14
cve 9
veracode 14
redhatcve 9
almalinux
almalinux
Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update
2022-05-10 07:59:57
osv
osv
25
Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update
2022-05-10 07:59:57
ntfs-3g - security update
2021-09-09 00:00:00
ntfs-3g - security update
2021-11-16 00:00:00
redhat
redhat
4
(RHSA-2022:1759) Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update
2022-05-10 07:59:57
(RHSA-2021:3703) Moderate: virt:av and virt-devel:av security and bug fix update
2021-09-30 16:19:56
(RHSA-2021:3704) Moderate: virt:8.2 and virt-devel:8.2 security update
2021-09-30 18:28:50
openvas
openvas
9
Debian: Security Advisory (DLA-2819-1)
2021-11-18 00:00:00
Debian: Security Advisory (DSA-4971-1)
2021-09-10 00:00:00
Mageia: Security Advisory (MGASA-2022-0001)
2022-01-28 00:00:00
mageia
mageia
Updated ntfs-3g packages fix security vulnerability
2022-01-03 10:36:40
nessus
nessus
20
AlmaLinux 8 : virt:rhel and virt-devel:rhel (ALSA-2022:1759)
2022-05-12 00:00:00
Debian DSA-4971-1 : ntfs-3g - security update
2021-09-09 00:00:00
Slackware Linux 14.2 / current ntfs-3g Multiple Vulnerabilities (SSA:2021-243-01)
2021-09-02 00:00:00
debian
debian
[SECURITY] [DLA 2819-1] ntfs-3g security update
2021-11-16 22:56:32
[SECURITY] [DSA 4971-1] ntfs-3g security update
2021-09-09 19:15:24
[SECURITY] [DSA 4971-1] ntfs-3g security update
2021-09-09 19:15:24
altlinux
altlinux
Security fix for the ALT Linux 9 package ntfs-3g version 2:2021.8.22-alt1
2021-09-10 00:00:00
rocky
rocky
virt:rhel and virt-devel:rhel security, bug fix, and enhancement update
2022-05-10 07:59:57
slackware
slackware
[slackware-security] ntfs-3g
2021-08-31 21:01:05
suse
suse
Security update for ntfs-3g_ntfsprogs (important)
2021-09-09 00:00:00
Security update for ntfs-3g_ntfsprogs (important)
2021-09-07 00:00:00
Security update for qemu (low)
2022-01-25 00:00:00
fedora
fedora
[SECURITY] Fedora 33 Update: ntfs-3g-2021.8.22-2.fc33
2021-09-23 19:30:16
[SECURITY] Fedora 35 Update: ntfs-3g-2021.8.22-2.fc35
2021-09-24 20:50:50
gentoo
gentoo
NTFS-3G: Multiple Vulnerabilities
2023-01-11 00:00:00
ubuntucve
ubuntucve
13
CVE-2021-35269
2021-09-07 00:00:00
CVE-2021-33286
2021-09-07 00:00:00
CVE-2021-39254
2021-09-07 00:00:00
nvd
nvd
13
CVE-2021-35269
2021-09-07 14:15:11
CVE-2021-39262
2021-09-07 15:15:08
CVE-2021-39252
2021-09-07 15:15:07
cbl_mariner
cbl_mariner
12
CVE-2021-35269 affecting package ntfs-3g for versions less than 2021.8.22-1
2022-04-26 19:57:41
CVE-2021-33287 affecting package ntfs-3g for versions less than 2021.8.22-1
2022-04-26 19:57:41
CVE-2021-39255 affecting package ntfs-3g for versions less than 2021.8.22-1
2022-04-26 19:57:41
cnvd
cnvd
13
Tuxera NTFS-3G Buffer Overflow Vulnerability (CNVD-2021-72266)
2021-09-07 00:00:00
Tuxera NTFS-3G has an unspecified vulnerability
2021-10-29 00:00:00
Tuxera NTFS-3G out-of-bounds read vulnerability
2021-09-08 00:00:00
prion
prion
10
Out-of-bounds
2021-09-07 15:15:00
Heap overflow
2021-09-07 14:15:00
Heap overflow
2021-09-07 15:15:00
alpinelinux
alpinelinux
10
CVE-2021-39259
2021-09-07 15:15:00
CVE-2021-39263
2021-09-07 15:15:00
CVE-2021-33286
2021-09-07 15:15:00
cvelist
cvelist
10
CVE-2021-39259
2021-09-07 00:00:00
CVE-2021-39263
2021-09-07 00:00:00
CVE-2021-39254
2021-09-07 00:00:00
debiancve
debiancve
14
CVE-2021-35269
2021-09-07 14:15:11
CVE-2021-39258
2021-09-07 15:15:08
CVE-2021-39255
2021-09-07 15:15:08
cve
cve
9
CVE-2021-35269
2021-09-07 14:15:11
CVE-2021-35268
2021-09-07 14:15:11
CVE-2021-39258
2021-09-07 15:15:08
veracode
veracode
14
Denial Of Service
2021-09-07 23:47:32
Denial Of Service
2021-09-08 15:35:43
Remote Code Execution (RCE)
2021-09-07 20:27:36
redhatcve
redhatcve
9
CVE-2021-35269
2021-09-06 17:22:18
CVE-2021-39263
2021-09-06 18:04:18
CVE-2021-39262
2021-09-06 18:04:22
EPSS
0.002
Percentile
56.2%
JSON
Related for ELSA-2022-1759
almalinux
1
osv
25
redhat
4
openvas
9
mageia
1
nessus
20
debian
3
altlinux
1
rocky
1
slackware
1
suse
3
fedora
2
gentoo
1
ubuntucve
13
nvd
13
cbl_mariner
12
cnvd
13
prion
10
alpinelinux
10
cvelist
10
debiancve
14
cve
9
veracode
14
redhatcve
9