exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2020-2342-01

Red Hat Security Advisory 2020-2342-01
Posted Jun 1, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-2342-01 - KVM is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Issues addressed include buffer overflow and out of bounds access vulnerabilities.

tags | advisory, overflow, vulnerability
systems | linux, redhat
advisories | CVE-2019-14378, CVE-2020-7039, CVE-2020-8608
SHA-256 | e543f9fef4963291f074e800e0194dcf8281b6d582e9a925d4bf1a1baa86e1ad

Red Hat Security Advisory 2020-2342-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: qemu-kvm-rhev bug fix update
Advisory ID: RHSA-2020:2342-01
Product: Red Hat Virtualization
Advisory URL: https://access.redhat.com/errata/RHSA-2020:2342
Issue date: 2020-06-01
CVE Names: CVE-2019-14378 CVE-2020-7039 CVE-2020-8608
====================================================================
1. Summary:

An update for qemu-kvm-rhev is now available for Red Hat Virtualization for
Red Hat Virtualization Host 7.

Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

RHV-M 4.2 - x86_64

3. Description:

KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on a variety of architectures. The qemu-kvm-rhev packages provide the
user-space component for running virtual machines that use KVM in
environments managed by Red Hat products.

Security Fix(es):

* CVE-2020-8608 QEMU: Slirp: potential OOB access due to unsafe snprintf()
usages

* CVE-2020-7039 QEMU: slirp: OOB buffer access while emulating tcp
protocols in tcp_emu()

* CVE-2019-14378 QEMU: slirp: heap buffer overflow during packet reassembly

This update fixes the following bug:

* BZ 1804577 Backport: Passthrough host CPU microcode version to KVM guest
if using CPU passthrough to RHEL 7.7/7.8 [rhel-7.6.z]

Users of qemu-kvm are advised to upgrade to these updated packages. After
installing this update, shut down all running virtual machines. Once all
virtual machines have shut down, start them again for this update to take
effect.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/2974891

5. Bugs fixed (https://bugzilla.redhat.com/):

1734745 - CVE-2019-14378 QEMU: slirp: heap buffer overflow during packet reassembly
1791551 - CVE-2020-7039 QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu()
1798453 - CVE-2020-8608 QEMU: Slirp: potential OOB access due to unsafe snprintf() usages
1804577 - Backport: Passthrough host CPU microcode version to KVM guest if using CPU passthrough to RHEL 7.7/7.8 [rhel-7.6.z]

6. Package List:

RHV-M 4.2:

Source:
qemu-kvm-rhev-2.12.0-18.el7_6.11.src.rpm

x86_64:
qemu-img-rhev-2.12.0-18.el7_6.11.x86_64.rpm
qemu-kvm-common-rhev-2.12.0-18.el7_6.11.x86_64.rpm
qemu-kvm-rhev-2.12.0-18.el7_6.11.x86_64.rpm
qemu-kvm-rhev-debuginfo-2.12.0-18.el7_6.11.x86_64.rpm
qemu-kvm-tools-rhev-2.12.0-18.el7_6.11.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-14378
https://access.redhat.com/security/cve/CVE-2020-7039
https://access.redhat.com/security/cve/CVE-2020-8608
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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¼Um
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close