Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
The following packages have been upgraded to a later upstream version: qemu-kvm (6.2.0), libvirt (8.0.0), libvirt-python (8.0.0), perl-Sys-Virt (8.0.0), seabios (1.15.0), libtpms (0.9.1). (BZ#1997410, BZ#2012802, BZ#2012806, BZ#2012813, BZ#2018392, BZ#2027716, BZ#2029355)
Security Fix(es):
QEMU: virtio-net: heap use-after-free in virtionetreceive_rcu (CVE-2021-3748)
ntfs-3g: Out-of-bounds heap buffer access in ntfsgetattributevalue() due to incorrect check of bytesin_use value in MFT records (CVE-2021-33285)
ntfs-3g: Heap buffer overflow triggered by a specially crafted Unicode string (CVE-2021-33286)
ntfs-3g: Heap buffer overflow in ntfsattrpread_i() triggered by specially crafted NTFS attributes (CVE-2021-33287)
ntfs-3g: Heap buffer overflow triggered by a specially crafted MFT section (CVE-2021-33289)
ntfs-3g: Heap buffer overflow triggered by a specially crafted NTFS inode pathname (CVE-2021-35266)
ntfs-3g: Stack buffer overflow triggered when correcting differences between MFT and MFTMirror sections (CVE-2021-35267)
ntfs-3g: Heap buffer overflow in ntfsinodereal_open() triggered by a specially crafted NTFS inode (CVE-2021-35268)
ntfs-3g: Heap buffer overflow in ntfsattrsetup_flag() triggered by a specially crafted NTFS attribute from MFT (CVE-2021-35269)
ntfs-3g: NULL pointer dereference in ntfsextentinode_open() (CVE-2021-39251)
ntfs-3g: Out-of-bounds read in ntfsielookup() (CVE-2021-39252)
ntfs-3g: Out-of-bounds read in ntfsrunlistsmerge_i() (CVE-2021-39253)
ntfs-3g: Integer overflow in memmove() leading to heap buffer overflow in ntfsattrrecord_resize() (CVE-2021-39254)
ntfs-3g: Out-of-bounds read ntfsattrfindinattrdef() triggered by an invalid attribute (CVE-2021-39255)
ntfs-3g: Heap buffer overflow in ntfsinodelookupbyname() (CVE-2021-39256)
ntfs-3g: Endless recursion from ntfsattrpwrite() triggered by an unallocated bitmap (CVE-2021-39257)
ntfs-3g: Out-of-bounds reads in ntfsattrfind() and ntfsexternalattr_find() (CVE-2021-39258)
ntfs-3g: Out-of-bounds access in ntfsinodelookupbyname() caused by an unsanitized attribute length (CVE-2021-39259)
ntfs-3g: Out-of-bounds access in ntfsinodesyncstandardinformation() (CVE-2021-39260)
ntfs-3g: Heap buffer overflow in ntfscompressedpwrite() (CVE-2021-39261)
ntfs-3g: Out-of-bounds access in ntfs_decompress() (CVE-2021-39262)
ntfs-3g: Heap buffer overflow in ntfsgetattribute_value() caused by an unsanitized attribute (CVE-2021-39263)
libnbd: nbdcopy: missing error handling may create corrupted destination image (CVE-2022-0485)
hivex: stack overflow due to recursive call of getchildren() (CVE-2021-3622)
nbdkit: NBDOPTSTRUCTURED_REPLY injection on STARTTLS (CVE-2021-3716)
libvirt: segmentation fault during VM shutdown can lead to vdsm hang (CVE-2021-3975)
QEMU: NULL pointer dereference in mirrorwaiton_conflicts() in block/mirror.c (CVE-2021-4145)
QEMU: NULL pointer dereference in pci_write() in hw/acpi/pcihp.c (CVE-2021-4158)
QEMU: block: fdc: null pointer dereference may lead to guest crash (CVE-2021-20196)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.