-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: qemu-kvm-rhev security update Advisory ID: RHSA-2020:4167-01 Product: Red Hat OpenStack Platform Advisory URL: https://access.redhat.com/errata/RHSA-2020:4167 Issue date: 2020-10-05 CVE Names: CVE-2019-20382 CVE-2020-14364 ==================================================================== 1. Summary: An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform 13 (Queens). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat OpenStack Platform 13.0 - ppc64le, x86_64 Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server - x86_64 3. Description: KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Security Fix(es): * usb: out-of-bounds r/w access issue while processing usb packets (CVE-2020-14364) * vnc: memory leakage upon disconnect (CVE-2019-20382) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1810390 - CVE-2019-20382 QEMU: vnc: memory leakage upon disconnect 1856805 - Update qemu-kvm-rhev for RHEL 7.9 compatibility 1869201 - CVE-2020-14364 QEMU: usb: out-of-bounds r/w access issue while processing usb packets 6. Package List: Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server: Source: qemu-kvm-rhev-2.12.0-18.el7_6.12.src.rpm x86_64: qemu-img-rhev-2.12.0-18.el7_6.12.x86_64.rpm qemu-kvm-common-rhev-2.12.0-18.el7_6.12.x86_64.rpm qemu-kvm-rhev-2.12.0-18.el7_6.12.x86_64.rpm qemu-kvm-rhev-debuginfo-2.12.0-18.el7_6.12.x86_64.rpm qemu-kvm-tools-rhev-2.12.0-18.el7_6.12.x86_64.rpm Red Hat OpenStack Platform 13.0: Source: qemu-kvm-rhev-2.12.0-48.el7_9.1.src.rpm ppc64le: qemu-img-rhev-2.12.0-48.el7_9.1.ppc64le.rpm qemu-kvm-common-rhev-2.12.0-48.el7_9.1.ppc64le.rpm qemu-kvm-rhev-2.12.0-48.el7_9.1.ppc64le.rpm qemu-kvm-rhev-debuginfo-2.12.0-48.el7_9.1.ppc64le.rpm qemu-kvm-tools-rhev-2.12.0-48.el7_9.1.ppc64le.rpm x86_64: qemu-img-rhev-2.12.0-48.el7_9.1.x86_64.rpm qemu-kvm-common-rhev-2.12.0-48.el7_9.1.x86_64.rpm qemu-kvm-rhev-2.12.0-48.el7_9.1.x86_64.rpm qemu-kvm-rhev-debuginfo-2.12.0-48.el7_9.1.x86_64.rpm qemu-kvm-tools-rhev-2.12.0-48.el7_9.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-20382 https://access.redhat.com/security/cve/CVE-2020-14364 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBX3rus9zjgjWX9erEAQj+wg/9GQ9CSOZxPVujT6NrJJcJL2qiH7kszEVl WyKT0VyAIO2Nn4ca/KdwYSXACSPxWISYD/COcyTnSOY9yQrEgVtS+tlqr6Q1nyKU 2LCtOmjGUO18e3Y2LgHcOqKw9L2TuewmZ9kgpgc7+r65uDCNYhOKXMwf0w0R2czo axRwKAPoEmkFCsB6ReE79wMqxMN4Yor4jAl3FootXl6PCZvA9TlvPlZre4AuoVe7 MpGcDc/kgkqYSUaeUzi0i6Ruv8KtHs+1fwgbF7NivzBfgOo2naaz+qmjYFrmWfs0 UB0x1cBGLbAAyo9WgqSaEkk+oW2OcZgDgwEwN25XfV5Gc8AutYs/9i/MnPKwnq7G VAGs37uWh3HRdU+NmHj9KAOzMeBkZ6LlCXMEQl2VRJbmtbNLCr4KWbl9Id/Y5Gd/ 5r1yF51BHlNc/xqoK3XGX3mt6XNa04gaqoGtMbx4eZu/sWJGMgFOxkQZLhCGJP52 rgKUJmzVVQGcVzj6FFDwviidX3aUfb7cMU1ZO1uKLpJ9H//w1i2hmiIR2Fy+Icr0 Rq0vuCAP0u7TSQ0w3AFqPIOEIqjbacRc5SuWO1RwV8C4nFaGIN8AXk0giqiJrhph 7a9ZSJv0ClE19Y+TU6HjC/jF3r8aAtnuOm5uTf/D7P2WkYSE8uAatuubvqTXlYR9 pN6861/hIQU=9vU9 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce