what you don't know can hurt you

Red Hat Security Advisory 2020-2342-01

Red Hat Security Advisory 2020-2342-01
Posted Jun 1, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-2342-01 - KVM is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Issues addressed include buffer overflow and out of bounds access vulnerabilities.

tags | advisory, overflow, vulnerability
systems | linux, redhat
advisories | CVE-2019-14378, CVE-2020-7039, CVE-2020-8608
MD5 | eee46e1ea242a66b68a9747fa2280480

Red Hat Security Advisory 2020-2342-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: qemu-kvm-rhev bug fix update
Advisory ID: RHSA-2020:2342-01
Product: Red Hat Virtualization
Advisory URL: https://access.redhat.com/errata/RHSA-2020:2342
Issue date: 2020-06-01
CVE Names: CVE-2019-14378 CVE-2020-7039 CVE-2020-8608
====================================================================
1. Summary:

An update for qemu-kvm-rhev is now available for Red Hat Virtualization for
Red Hat Virtualization Host 7.

Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

RHV-M 4.2 - x86_64

3. Description:

KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on a variety of architectures. The qemu-kvm-rhev packages provide the
user-space component for running virtual machines that use KVM in
environments managed by Red Hat products.

Security Fix(es):

* CVE-2020-8608 QEMU: Slirp: potential OOB access due to unsafe snprintf()
usages

* CVE-2020-7039 QEMU: slirp: OOB buffer access while emulating tcp
protocols in tcp_emu()

* CVE-2019-14378 QEMU: slirp: heap buffer overflow during packet reassembly

This update fixes the following bug:

* BZ 1804577 Backport: Passthrough host CPU microcode version to KVM guest
if using CPU passthrough to RHEL 7.7/7.8 [rhel-7.6.z]

Users of qemu-kvm are advised to upgrade to these updated packages. After
installing this update, shut down all running virtual machines. Once all
virtual machines have shut down, start them again for this update to take
effect.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/2974891

5. Bugs fixed (https://bugzilla.redhat.com/):

1734745 - CVE-2019-14378 QEMU: slirp: heap buffer overflow during packet reassembly
1791551 - CVE-2020-7039 QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu()
1798453 - CVE-2020-8608 QEMU: Slirp: potential OOB access due to unsafe snprintf() usages
1804577 - Backport: Passthrough host CPU microcode version to KVM guest if using CPU passthrough to RHEL 7.7/7.8 [rhel-7.6.z]

6. Package List:

RHV-M 4.2:

Source:
qemu-kvm-rhev-2.12.0-18.el7_6.11.src.rpm

x86_64:
qemu-img-rhev-2.12.0-18.el7_6.11.x86_64.rpm
qemu-kvm-common-rhev-2.12.0-18.el7_6.11.x86_64.rpm
qemu-kvm-rhev-2.12.0-18.el7_6.11.x86_64.rpm
qemu-kvm-rhev-debuginfo-2.12.0-18.el7_6.11.x86_64.rpm
qemu-kvm-tools-rhev-2.12.0-18.el7_6.11.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-14378
https://access.redhat.com/security/cve/CVE-2020-7039
https://access.redhat.com/security/cve/CVE-2020-8608
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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¬ľUm
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

July 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    15 Files
  • 2
    Jul 2nd
    19 Files
  • 3
    Jul 3rd
    11 Files
  • 4
    Jul 4th
    0 Files
  • 5
    Jul 5th
    0 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    0 Files
  • 9
    Jul 9th
    0 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close