6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.7 Medium
AI Score
Confidence
High
3.5 Low
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:S/C:N/I:N/A:P
0.002 Low
EPSS
Percentile
60.8%
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
QEMU: net: e1000e: use-after-free while sending packets (CVE-2020-15859)
QEMU: slirp: invalid pointer initialization may lead to information disclosure (bootp) (CVE-2021-3592)
QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp6) (CVE-2021-3593)
QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp) (CVE-2021-3594)
QEMU: slirp: invalid pointer initialization may lead to information disclosure (tftp) (CVE-2021-3595)
libvirt: Insecure sVirt label generation (CVE-2021-3631)
libvirt: Improper locking on ACL failure in virStoragePoolLookupByTargetPath API (CVE-2021-3667)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
bugzilla.redhat.com/show_bug.cgi?id=1855250
bugzilla.redhat.com/show_bug.cgi?id=1859168
bugzilla.redhat.com/show_bug.cgi?id=1929357
bugzilla.redhat.com/show_bug.cgi?id=1932823
bugzilla.redhat.com/show_bug.cgi?id=1933640
bugzilla.redhat.com/show_bug.cgi?id=1934509
bugzilla.redhat.com/show_bug.cgi?id=1939418
bugzilla.redhat.com/show_bug.cgi?id=1942805
bugzilla.redhat.com/show_bug.cgi?id=1961562
bugzilla.redhat.com/show_bug.cgi?id=1967329
bugzilla.redhat.com/show_bug.cgi?id=1967496
bugzilla.redhat.com/show_bug.cgi?id=1967716
bugzilla.redhat.com/show_bug.cgi?id=1967914
bugzilla.redhat.com/show_bug.cgi?id=1969848
bugzilla.redhat.com/show_bug.cgi?id=1970484
bugzilla.redhat.com/show_bug.cgi?id=1970487
bugzilla.redhat.com/show_bug.cgi?id=1970489
bugzilla.redhat.com/show_bug.cgi?id=1970491
bugzilla.redhat.com/show_bug.cgi?id=1977726
bugzilla.redhat.com/show_bug.cgi?id=1982134
bugzilla.redhat.com/show_bug.cgi?id=1986094
bugzilla.redhat.com/show_bug.cgi?id=1994041
errata.rockylinux.org/RLSA-2021:4191
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.7 Medium
AI Score
Confidence
High
3.5 Low
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:S/C:N/I:N/A:P
0.002 Low
EPSS
Percentile
60.8%