Rocky Linux: RLSA-2022:7472 virt | LinuxSecurity.com
{ "type": "TYPE_SECURITY", "shortCode": "RL", "name": "RLSA-2022:7472", "synopsis": "Low: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update", "severity": "SEVERITY_LOW", "topic": "An update for the virt:rhel and virt-devel:rhel modules is now available for Rocky Linux 8.\nRocky Enterprise Software Foundation Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "description": "Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.\nThe following packages have been upgraded to a later upstream version: qemu-kvm (6.2.0). (BZ#2066828)\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\nAdditional Changes:\nFor detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.", "solution": null, "affectedProducts": ["Rocky Linux 8"], "fixes": [{ "ticket": "1519071", "sourceBy": "Red Hat", "sourceLink": "https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=1519071", "description": "Fail to rebuild the reference count tables of qcow2 image on host block devices (e.g. LVs)" }, { "ticket": "1851227", "sourceBy": "Red Hat", "sourceLink": "https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=1851227", "description": "When doing a cpu-baseline between skylake and cascadelake, cascadelake is selected as baseline." }, { "ticket": "1951118", "sourceBy": "Red Hat", "sourceLink": "https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=1951118", "description": "CVE-2021-3507 QEMU: fdc: heap buffer overflow in DMA read data transfers" }, { "ticket": "1985827", "sourceBy": "Red Hat", "sourceLink": "https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=1985827", "description": "Start or remove VM failure even v2v has already finished" }], "cves": [{ "name": "CVE-2021-3507", "sourceBy": "Red Hat", "sourceLink": "https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2021-3507.json", "cvss3ScoringVector": "CVSS:3.1\/AV:L\/AC:L\/PR:H\/UI:N\/S:C\/C:L\/I:N\/A:L", "cvss3BaseScore": "4.6", "cwe": "CWE-119" }, { "name": "CVE-2022-0897", "sourceBy": "Red Hat", "sourceLink": "https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-0897.json", "cvss3ScoringVector": "CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:N\/A:H", "cvss3BaseScore": "5.0", "cwe": "CWE-667" }, { "name": "CVE-2022-2211", "sourceBy": "Red Hat", "sourceLink": "https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-2211.json", "cvss3ScoringVector": "CVSS:3.1\/AV:L\/AC:L\/PR:N\/UI:R\/S:U\/C:N\/I:N\/A:H", "cvss3BaseScore": "5.5", "cwe": "CWE-119" }, { "name": "CVE-2022-23645", "sourceBy": "Red Hat", "sourceLink": "https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-23645.json", "cvss3ScoringVector": "CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H", "cvss3BaseScore": "5.5", "cwe": "CWE-125" }], "references": [], "publishedAt": "2022-11-13T07:53:54.336436Z", "rpms": {}, "rebootSuggested": false }

Rocky Linux: RLSA-2022:7472 virt

November 13, 2022
An update for the virt:rhel and virt-devel:rhel modules is now available for Rocky Linux 8. Rocky Enterprise Software Foundation Product Security has rated this update as having a security impact of Low

Summary

An update for the virt:rhel and virt-devel:rhel modules is now available for Rocky Linux 8. Rocky Enterprise Software Foundation Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.


Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. The following packages have been upgraded to a later upstream version: qemu-kvm (6.2.0). (BZ#2066828) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.

RPMs

References

No References

CVEs

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3507.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0897.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2211.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23645.json

Severity
Name: RLSA-2022:7472
Affected Products: Rocky Linux 8

Fixes

https://bugzilla.redhat.com/show_bug.cgi?id=1519071

https://bugzilla.redhat.com/show_bug.cgi?id=1851227

https://bugzilla.redhat.com/show_bug.cgi?id=1951118

https://bugzilla.redhat.com/show_bug.cgi?id=1985827


We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.