what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2020-2342-01

Red Hat Security Advisory 2020-2342-01
Posted Jun 1, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-2342-01 - KVM is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Issues addressed include buffer overflow and out of bounds access vulnerabilities.

tags | advisory, overflow, vulnerability
systems | linux, redhat
advisories | CVE-2019-14378, CVE-2020-7039, CVE-2020-8608
SHA-256 | e543f9fef4963291f074e800e0194dcf8281b6d582e9a925d4bf1a1baa86e1ad

Red Hat Security Advisory 2020-2342-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: qemu-kvm-rhev bug fix update
Advisory ID: RHSA-2020:2342-01
Product: Red Hat Virtualization
Advisory URL: https://access.redhat.com/errata/RHSA-2020:2342
Issue date: 2020-06-01
CVE Names: CVE-2019-14378 CVE-2020-7039 CVE-2020-8608
====================================================================
1. Summary:

An update for qemu-kvm-rhev is now available for Red Hat Virtualization for
Red Hat Virtualization Host 7.

Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

RHV-M 4.2 - x86_64

3. Description:

KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on a variety of architectures. The qemu-kvm-rhev packages provide the
user-space component for running virtual machines that use KVM in
environments managed by Red Hat products.

Security Fix(es):

* CVE-2020-8608 QEMU: Slirp: potential OOB access due to unsafe snprintf()
usages

* CVE-2020-7039 QEMU: slirp: OOB buffer access while emulating tcp
protocols in tcp_emu()

* CVE-2019-14378 QEMU: slirp: heap buffer overflow during packet reassembly

This update fixes the following bug:

* BZ 1804577 Backport: Passthrough host CPU microcode version to KVM guest
if using CPU passthrough to RHEL 7.7/7.8 [rhel-7.6.z]

Users of qemu-kvm are advised to upgrade to these updated packages. After
installing this update, shut down all running virtual machines. Once all
virtual machines have shut down, start them again for this update to take
effect.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/2974891

5. Bugs fixed (https://bugzilla.redhat.com/):

1734745 - CVE-2019-14378 QEMU: slirp: heap buffer overflow during packet reassembly
1791551 - CVE-2020-7039 QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu()
1798453 - CVE-2020-8608 QEMU: Slirp: potential OOB access due to unsafe snprintf() usages
1804577 - Backport: Passthrough host CPU microcode version to KVM guest if using CPU passthrough to RHEL 7.7/7.8 [rhel-7.6.z]

6. Package List:

RHV-M 4.2:

Source:
qemu-kvm-rhev-2.12.0-18.el7_6.11.src.rpm

x86_64:
qemu-img-rhev-2.12.0-18.el7_6.11.x86_64.rpm
qemu-kvm-common-rhev-2.12.0-18.el7_6.11.x86_64.rpm
qemu-kvm-rhev-2.12.0-18.el7_6.11.x86_64.rpm
qemu-kvm-rhev-debuginfo-2.12.0-18.el7_6.11.x86_64.rpm
qemu-kvm-tools-rhev-2.12.0-18.el7_6.11.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-14378
https://access.redhat.com/security/cve/CVE-2020-7039
https://access.redhat.com/security/cve/CVE-2020-8608
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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¼Um
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close