7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.5 High
AI Score
Confidence
High
6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
0.002 Low
EPSS
Percentile
55.5%
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
The following packages have been upgraded to a later upstream version: qemu-kvm (6.2.0), libvirt (8.0.0), libvirt-python (8.0.0), perl-Sys-Virt (8.0.0), seabios (1.15.0), libtpms (0.9.1). (BZ#1997410, BZ#2012802, BZ#2012806, BZ#2012813, BZ#2018392, BZ#2027716, BZ#2029355)
Security Fix(es):
QEMU: virtio-net: heap use-after-free in virtio_net_receive_rcu (CVE-2021-3748)
ntfs-3g: Out-of-bounds heap buffer access in ntfs_get_attribute_value() due to incorrect check of bytes_in_use value in MFT records (CVE-2021-33285)
ntfs-3g: Heap buffer overflow triggered by a specially crafted Unicode string (CVE-2021-33286)
ntfs-3g: Heap buffer overflow in ntfs_attr_pread_i() triggered by specially crafted NTFS attributes (CVE-2021-33287)
ntfs-3g: Heap buffer overflow triggered by a specially crafted MFT section (CVE-2021-33289)
ntfs-3g: Heap buffer overflow triggered by a specially crafted NTFS inode pathname (CVE-2021-35266)
ntfs-3g: Stack buffer overflow triggered when correcting differences between MFT and MFTMirror sections (CVE-2021-35267)
ntfs-3g: Heap buffer overflow in ntfs_inode_real_open() triggered by a specially crafted NTFS inode (CVE-2021-35268)
ntfs-3g: Heap buffer overflow in ntfs_attr_setup_flag() triggered by a specially crafted NTFS attribute from MFT (CVE-2021-35269)
ntfs-3g: NULL pointer dereference in ntfs_extent_inode_open() (CVE-2021-39251)
ntfs-3g: Out-of-bounds read in ntfs_ie_lookup() (CVE-2021-39252)
ntfs-3g: Out-of-bounds read in ntfs_runlists_merge_i() (CVE-2021-39253)
ntfs-3g: Integer overflow in memmove() leading to heap buffer overflow in ntfs_attr_record_resize() (CVE-2021-39254)
ntfs-3g: Out-of-bounds read ntfs_attr_find_in_attrdef() triggered by an invalid attribute (CVE-2021-39255)
ntfs-3g: Heap buffer overflow in ntfs_inode_lookup_by_name() (CVE-2021-39256)
ntfs-3g: Endless recursion from ntfs_attr_pwrite() triggered by an unallocated bitmap (CVE-2021-39257)
ntfs-3g: Out-of-bounds reads in ntfs_attr_find() and ntfs_external_attr_find() (CVE-2021-39258)
ntfs-3g: Out-of-bounds access in ntfs_inode_lookup_by_name() caused by an unsanitized attribute length (CVE-2021-39259)
ntfs-3g: Out-of-bounds access in ntfs_inode_sync_standard_information() (CVE-2021-39260)
ntfs-3g: Heap buffer overflow in ntfs_compressed_pwrite() (CVE-2021-39261)
ntfs-3g: Out-of-bounds access in ntfs_decompress() (CVE-2021-39262)
ntfs-3g: Heap buffer overflow in ntfs_get_attribute_value() caused by an unsanitized attribute (CVE-2021-39263)
libnbd: nbdcopy: missing error handling may create corrupted destination image (CVE-2022-0485)
hivex: stack overflow due to recursive call of _get_children() (CVE-2021-3622)
nbdkit: NBD_OPT_STRUCTURED_REPLY injection on STARTTLS (CVE-2021-3716)
libvirt: segmentation fault during VM shutdown can lead to vdsm hang (CVE-2021-3975)
QEMU: NULL pointer dereference in mirror_wait_on_conflicts() in block/mirror.c (CVE-2021-4145)
QEMU: NULL pointer dereference in pci_write() in hw/acpi/pcihp.c (CVE-2021-4158)
QEMU: block: fdc: null pointer dereference may lead to guest crash (CVE-2021-20196)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
bugzilla.redhat.com/show_bug.cgi?id=1510237
bugzilla.redhat.com/show_bug.cgi?id=1677608
bugzilla.redhat.com/show_bug.cgi?id=1689202
bugzilla.redhat.com/show_bug.cgi?id=1738392
bugzilla.redhat.com/show_bug.cgi?id=1743098
bugzilla.redhat.com/show_bug.cgi?id=1806857
bugzilla.redhat.com/show_bug.cgi?id=1810863
bugzilla.redhat.com/show_bug.cgi?id=1836094
bugzilla.redhat.com/show_bug.cgi?id=1845468
bugzilla.redhat.com/show_bug.cgi?id=1852762
bugzilla.redhat.com/show_bug.cgi?id=1867087
bugzilla.redhat.com/show_bug.cgi?id=1919210
bugzilla.redhat.com/show_bug.cgi?id=1924972
bugzilla.redhat.com/show_bug.cgi?id=1926508
bugzilla.redhat.com/show_bug.cgi?id=1942275
bugzilla.redhat.com/show_bug.cgi?id=1943203
bugzilla.redhat.com/show_bug.cgi?id=1953389
bugzilla.redhat.com/show_bug.cgi?id=1965140
bugzilla.redhat.com/show_bug.cgi?id=1965589
bugzilla.redhat.com/show_bug.cgi?id=1965638
bugzilla.redhat.com/show_bug.cgi?id=1972515
bugzilla.redhat.com/show_bug.cgi?id=1975489
bugzilla.redhat.com/show_bug.cgi?id=1975840
bugzilla.redhat.com/show_bug.cgi?id=1978574
bugzilla.redhat.com/show_bug.cgi?id=1981782
bugzilla.redhat.com/show_bug.cgi?id=1982993
bugzilla.redhat.com/show_bug.cgi?id=1983684
bugzilla.redhat.com/show_bug.cgi?id=1984721
bugzilla.redhat.com/show_bug.cgi?id=1985451
bugzilla.redhat.com/show_bug.cgi?id=1988104
bugzilla.redhat.com/show_bug.cgi?id=1988986
bugzilla.redhat.com/show_bug.cgi?id=1989338
bugzilla.redhat.com/show_bug.cgi?id=1989520
bugzilla.redhat.com/show_bug.cgi?id=1990135
bugzilla.redhat.com/show_bug.cgi?id=1994695
bugzilla.redhat.com/show_bug.cgi?id=1995865
bugzilla.redhat.com/show_bug.cgi?id=1996530
bugzilla.redhat.com/show_bug.cgi?id=1997410
bugzilla.redhat.com/show_bug.cgi?id=1998514
bugzilla.redhat.com/show_bug.cgi?id=1998947
bugzilla.redhat.com/show_bug.cgi?id=1998949
bugzilla.redhat.com/show_bug.cgi?id=1998950
bugzilla.redhat.com/show_bug.cgi?id=2000225
bugzilla.redhat.com/show_bug.cgi?id=2001525
bugzilla.redhat.com/show_bug.cgi?id=2001608
bugzilla.redhat.com/show_bug.cgi?id=2001609
bugzilla.redhat.com/show_bug.cgi?id=2001613
bugzilla.redhat.com/show_bug.cgi?id=2001616
bugzilla.redhat.com/show_bug.cgi?id=2001619
bugzilla.redhat.com/show_bug.cgi?id=2001621
bugzilla.redhat.com/show_bug.cgi?id=2001623
bugzilla.redhat.com/show_bug.cgi?id=2001645
bugzilla.redhat.com/show_bug.cgi?id=2001649
bugzilla.redhat.com/show_bug.cgi?id=2001650
bugzilla.redhat.com/show_bug.cgi?id=2001651
bugzilla.redhat.com/show_bug.cgi?id=2001652
bugzilla.redhat.com/show_bug.cgi?id=2001653
bugzilla.redhat.com/show_bug.cgi?id=2001654
bugzilla.redhat.com/show_bug.cgi?id=2001656
bugzilla.redhat.com/show_bug.cgi?id=2001658
bugzilla.redhat.com/show_bug.cgi?id=2001659
bugzilla.redhat.com/show_bug.cgi?id=2001661
bugzilla.redhat.com/show_bug.cgi?id=2001662
bugzilla.redhat.com/show_bug.cgi?id=2001665
bugzilla.redhat.com/show_bug.cgi?id=2001667
bugzilla.redhat.com/show_bug.cgi?id=2002607
bugzilla.redhat.com/show_bug.cgi?id=2002694
bugzilla.redhat.com/show_bug.cgi?id=2002907
bugzilla.redhat.com/show_bug.cgi?id=2003071
bugzilla.redhat.com/show_bug.cgi?id=2003679
bugzilla.redhat.com/show_bug.cgi?id=2004416
bugzilla.redhat.com/show_bug.cgi?id=2004812
bugzilla.redhat.com/show_bug.cgi?id=2007129
bugzilla.redhat.com/show_bug.cgi?id=2009236
bugzilla.redhat.com/show_bug.cgi?id=2012385
bugzilla.redhat.com/show_bug.cgi?id=2012802
bugzilla.redhat.com/show_bug.cgi?id=2012806
bugzilla.redhat.com/show_bug.cgi?id=2012813
bugzilla.redhat.com/show_bug.cgi?id=2013916
bugzilla.redhat.com/show_bug.cgi?id=2017928
bugzilla.redhat.com/show_bug.cgi?id=2018173
bugzilla.redhat.com/show_bug.cgi?id=2018392
bugzilla.redhat.com/show_bug.cgi?id=2020630
bugzilla.redhat.com/show_bug.cgi?id=2021778
bugzilla.redhat.com/show_bug.cgi?id=2022604
bugzilla.redhat.com/show_bug.cgi?id=2022606
bugzilla.redhat.com/show_bug.cgi?id=2022607
bugzilla.redhat.com/show_bug.cgi?id=2022608
bugzilla.redhat.com/show_bug.cgi?id=2023279
bugzilla.redhat.com/show_bug.cgi?id=2024326
bugzilla.redhat.com/show_bug.cgi?id=2024419
bugzilla.redhat.com/show_bug.cgi?id=2025769
bugzilla.redhat.com/show_bug.cgi?id=2026834
bugzilla.redhat.com/show_bug.cgi?id=2027208
bugzilla.redhat.com/show_bug.cgi?id=2027716
bugzilla.redhat.com/show_bug.cgi?id=2029355
bugzilla.redhat.com/show_bug.cgi?id=2029380
bugzilla.redhat.com/show_bug.cgi?id=2029582
bugzilla.redhat.com/show_bug.cgi?id=2029612
bugzilla.redhat.com/show_bug.cgi?id=2029647
bugzilla.redhat.com/show_bug.cgi?id=2030119
bugzilla.redhat.com/show_bug.cgi?id=2030435
bugzilla.redhat.com/show_bug.cgi?id=2030437
bugzilla.redhat.com/show_bug.cgi?id=2030438
bugzilla.redhat.com/show_bug.cgi?id=2031035
bugzilla.redhat.com/show_bug.cgi?id=2031039
bugzilla.redhat.com/show_bug.cgi?id=2031041
bugzilla.redhat.com/show_bug.cgi?id=2033279
bugzilla.redhat.com/show_bug.cgi?id=2034602
bugzilla.redhat.com/show_bug.cgi?id=2035002
bugzilla.redhat.com/show_bug.cgi?id=2035177
bugzilla.redhat.com/show_bug.cgi?id=2035185
bugzilla.redhat.com/show_bug.cgi?id=2035237
bugzilla.redhat.com/show_bug.cgi?id=2035714
bugzilla.redhat.com/show_bug.cgi?id=2036178
bugzilla.redhat.com/show_bug.cgi?id=2037135
bugzilla.redhat.com/show_bug.cgi?id=2041480
bugzilla.redhat.com/show_bug.cgi?id=2041610
bugzilla.redhat.com/show_bug.cgi?id=2043584
bugzilla.redhat.com/show_bug.cgi?id=2045945
bugzilla.redhat.com/show_bug.cgi?id=2046172
bugzilla.redhat.com/show_bug.cgi?id=2050324
bugzilla.redhat.com/show_bug.cgi?id=2050697
bugzilla.redhat.com/show_bug.cgi?id=2050702
bugzilla.redhat.com/show_bug.cgi?id=2054597
bugzilla.redhat.com/show_bug.cgi?id=2059311
bugzilla.redhat.com/show_bug.cgi?id=2065314
errata.rockylinux.org/RLSA-2022:1759
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.5 High
AI Score
Confidence
High
6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
0.002 Low
EPSS
Percentile
55.5%