Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
libvirt: double free in qemuAgentGetInterfaces() in qemu_agent.c (CVE-2020-25637)
QEMU: heap buffer overflow in msix_table_mmio_write() in hw/pci/msix.c (CVE-2020-27821)
QEMU: ide: atapi: OOB access while processing read commands (CVE-2020-29443)
QEMU: heap buffer overflow in iscsi_aio_ioctl_cb() in block/iscsi.c may lead to information disclosure (CVE-2020-11947)
QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment() in hw/net/net_tx_pkt.c (CVE-2020-16092)
QEMU: infinite loop in e1000e_write_packet_to_guest() in hw/net/e1000e_core.c (CVE-2020-25707)
QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c (CVE-2020-25723)
QEMU: e1000e: infinite loop scenario in case of null packet descriptor (CVE-2020-28916)
QEMU: slirp: out-of-bounds access while processing ARP/NCSI packets (CVE-2020-29129, CVE-2020-29130)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
bugzilla.redhat.com/show_bug.cgi?id=1384241
bugzilla.redhat.com/show_bug.cgi?id=1798463
bugzilla.redhat.com/show_bug.cgi?id=1828952
bugzilla.redhat.com/show_bug.cgi?id=1834281
bugzilla.redhat.com/show_bug.cgi?id=1837495
bugzilla.redhat.com/show_bug.cgi?id=1843852
bugzilla.redhat.com/show_bug.cgi?id=1846975
bugzilla.redhat.com/show_bug.cgi?id=1850680
bugzilla.redhat.com/show_bug.cgi?id=1859494
bugzilla.redhat.com/show_bug.cgi?id=1860283
bugzilla.redhat.com/show_bug.cgi?id=1872854
bugzilla.redhat.com/show_bug.cgi?id=1874304
bugzilla.redhat.com/show_bug.cgi?id=1874780
bugzilla.redhat.com/show_bug.cgi?id=1876297
bugzilla.redhat.com/show_bug.cgi?id=1876742
bugzilla.redhat.com/show_bug.cgi?id=1880418
bugzilla.redhat.com/show_bug.cgi?id=1880546
bugzilla.redhat.com/show_bug.cgi?id=1881037
bugzilla.redhat.com/show_bug.cgi?id=1884531
bugzilla.redhat.com/show_bug.cgi?id=1893895
bugzilla.redhat.com/show_bug.cgi?id=1898579
bugzilla.redhat.com/show_bug.cgi?id=1901837
bugzilla.redhat.com/show_bug.cgi?id=1902231
bugzilla.redhat.com/show_bug.cgi?id=1902651
bugzilla.redhat.com/show_bug.cgi?id=1902960
bugzilla.redhat.com/show_bug.cgi?id=1903064
bugzilla.redhat.com/show_bug.cgi?id=1910220
bugzilla.redhat.com/show_bug.cgi?id=1910267
bugzilla.redhat.com/show_bug.cgi?id=1910326
bugzilla.redhat.com/show_bug.cgi?id=1912765
bugzilla.redhat.com/show_bug.cgi?id=1917446
bugzilla.redhat.com/show_bug.cgi?id=1918708
errata.rockylinux.org/RLSA-2021:1762