6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
6.5 Medium
AI Score
Confidence
High
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
0.001 Low
EPSS
Percentile
37.9%
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
The following packages have been upgraded to a later upstream version: qemu-kvm (6.2.0). (BZ#2066828)
Security Fix(es):
QEMU: fdc: heap buffer overflow in DMA read data transfers (CVE-2021-3507)
libvirt: missing locking in nwfilterConnectNumOfNWFilters can lead to denial of service (CVE-2022-0897)
libguestfs: Buffer overflow in get_keys leads to DoS (CVE-2022-2211)
swtpm: Unchecked header size indicator against expected size (CVE-2022-23645)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
bugzilla.redhat.com/show_bug.cgi?id=1519071
bugzilla.redhat.com/show_bug.cgi?id=1851227
bugzilla.redhat.com/show_bug.cgi?id=1951118
bugzilla.redhat.com/show_bug.cgi?id=1985827
bugzilla.redhat.com/show_bug.cgi?id=2028823
bugzilla.redhat.com/show_bug.cgi?id=2029980
bugzilla.redhat.com/show_bug.cgi?id=2051332
bugzilla.redhat.com/show_bug.cgi?id=2056491
bugzilla.redhat.com/show_bug.cgi?id=2060843
bugzilla.redhat.com/show_bug.cgi?id=2062610
bugzilla.redhat.com/show_bug.cgi?id=2062611
bugzilla.redhat.com/show_bug.cgi?id=2063883
bugzilla.redhat.com/show_bug.cgi?id=2066828
bugzilla.redhat.com/show_bug.cgi?id=2067118
bugzilla.redhat.com/show_bug.cgi?id=2067126
bugzilla.redhat.com/show_bug.cgi?id=2069946
bugzilla.redhat.com/show_bug.cgi?id=2070417
bugzilla.redhat.com/show_bug.cgi?id=2071070
bugzilla.redhat.com/show_bug.cgi?id=2072049
bugzilla.redhat.com/show_bug.cgi?id=2072377
bugzilla.redhat.com/show_bug.cgi?id=2072932
bugzilla.redhat.com/show_bug.cgi?id=2073012
bugzilla.redhat.com/show_bug.cgi?id=2075424
bugzilla.redhat.com/show_bug.cgi?id=2079582
bugzilla.redhat.com/show_bug.cgi?id=2083884
bugzilla.redhat.com/show_bug.cgi?id=2084566
bugzilla.redhat.com/show_bug.cgi?id=2089433
bugzilla.redhat.com/show_bug.cgi?id=2089623
bugzilla.redhat.com/show_bug.cgi?id=2091597
bugzilla.redhat.com/show_bug.cgi?id=2092756
bugzilla.redhat.com/show_bug.cgi?id=2095758
bugzilla.redhat.com/show_bug.cgi?id=2097209
bugzilla.redhat.com/show_bug.cgi?id=2097652
bugzilla.redhat.com/show_bug.cgi?id=2097947
bugzilla.redhat.com/show_bug.cgi?id=2100508
bugzilla.redhat.com/show_bug.cgi?id=2100862
bugzilla.redhat.com/show_bug.cgi?id=2101575
bugzilla.redhat.com/show_bug.cgi?id=2101787
bugzilla.redhat.com/show_bug.cgi?id=2107954
bugzilla.redhat.com/show_bug.cgi?id=2110203
bugzilla.redhat.com/show_bug.cgi?id=2111433
bugzilla.redhat.com/show_bug.cgi?id=2112296
bugzilla.redhat.com/show_bug.cgi?id=2120279
bugzilla.redhat.com/show_bug.cgi?id=2127109
errata.rockylinux.org/RLSA-2022:7472
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
6.5 Medium
AI Score
Confidence
High
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
0.001 Low
EPSS
Percentile
37.9%