Lucene search

K
redhatRedHatRHSA-2020:1216
HistoryMar 31, 2020 - 2:08 p.m.

(RHSA-2020:1216) Important: qemu-kvm-rhev security, bug fix, and enhancement update

2020-03-3114:08:10
access.redhat.com
124

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.017 Low

EPSS

Percentile

87.5%

KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products.

Security Fix(es):

  • QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378)

  • QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server (CVE-2020-1711)

  • QEMU: qxl: null pointer dereference while releasing spice resources (CVE-2019-12155)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • After host update, older windows clients have large time drift (BZ#1639098)

  • [v2v] Migration performance regression (BZ#1648622)

  • Live storage migration fails with: TimeoutError: Timed out during operation: cannot acquire state change lock (held by monitor=remoteDispatchConnectGetAllDomainStats) and the VM becomes ‘Not Responding’ (BZ#1665256)

  • QEMU gets stuck on resume/cont call from libvirt (BZ#1673546)

  • [Intel 7.8 Bug] [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM qemu-kvm-rhev (BZ#1709972)

  • qemu aborts in blockCommit: qemu-kvm: block.c:3486: bdrv_replace_node: Assertion `!({ _Static_assert(!(sizeof(&from->in_flight) > 8), "not expecting: " "sizeof(&from->in_flight) > ATOMIC_REG_SIZE"); __atomic_load_n(&from->in_flight, 0); })’ failed. (BZ#1711643)

  • ccid: Fix incorrect dwProtocol advertisement of T=0 (BZ#1721522)

  • Fail to migrate a rhel6.10-mt7.6 guest with dimm device (BZ#1724048)

  • qemu-kvm: backport cpuidle-haltpoll support (BZ#1734502)

  • qemu, qemu-img fail to detect alignment with XFS and Gluster/XFS on 4k block device (BZ#1743365)

  • ISST-LTE:RHV4.3 on RHEL7.6 kvm host:Power8:Tuleta-L:lotg7: call traces dumped on guest while performing guest migration (qemu-kvm-rhev) (BZ#1743508)

  • qemu coredump: qemu-kvm: block/create.c:68: qmp_blockdev_create: Assertion `drv’ failed (BZ#1746224)

  • [Data plane]virtio_scsi_ctx_check: Assertion `blk_get_aio_context(d->conf.blk) == s->ctx’ failed when unplug a device that running block stream on it (BZ#1764120)

  • qemu-kvm crashes when Windows VM is migrated with multiqueue (BZ#1775251)

Enhancement(s):

  • [Intel 7.8 FEAT] MDS_NO exposure to guest - qemu-kvm-rhev (BZ#1716726)

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.017 Low

EPSS

Percentile

87.5%