Lucene search

K
redhatRedHatRHSA-2020:4676
HistoryNov 03, 2020 - 12:26 p.m.

(RHSA-2020:4676) Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update

2020-11-0312:26:07
access.redhat.com
39

8.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.009 Low

EPSS

Percentile

82.6%

Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.

The following packages have been upgraded to a later upstream version: hivex (1.3.18), libguestfs (1.40.2), libguestfs-winsupport (8.2), libvirt (6.0.0), libvirt-dbus (1.3.0), libvirt-python (6.0.0), nbdkit (1.16.2), perl-Sys-Virt (6.0.0), qemu-kvm (4.2.0), seabios (1.13.0), SLOF (20191022). (BZ#1810193, BZ#1844296)

Security Fix(es):

  • libvirt: leak of /dev/mapper/control into QEMU guests (CVE-2020-14339)

  • QEMU: Slirp: use-after-free during packet reassembly (CVE-2019-15890)

  • libvirt: Potential DoS by holding a monitor job while querying QEMU guest-agent (CVE-2019-20485)

  • QEMU: slirp: use-after-free in ip_reass() function in ip_input.c (CVE-2020-1983)

  • libvirt: Potential denial of service via active pool without target path (CVE-2020-10703)

  • libvirt: leak of sensitive cookie information via dumpxml (CVE-2020-14301)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.

OSVersionArchitecturePackageVersionFilename
RedHatanyi686libvirt-daemon-driver-storage-mpath< 6.0.0-28.module+el8.3.0+7827+5e65edd7libvirt-daemon-driver-storage-mpath-6.0.0-28.module+el8.3.0+7827+5e65edd7.i686.rpm
RedHatanyppc64leqemu-kvm-block-rbd-debuginfo< 4.2.0-34.module+el8.3.0+7976+077be4ecqemu-kvm-block-rbd-debuginfo-4.2.0-34.module+el8.3.0+7976+077be4ec.ppc64le.rpm
RedHatanyaarch64python3-libvirt-debuginfo< 6.0.0-1.module+el8.3.0+6423+e4cb6418python3-libvirt-debuginfo-6.0.0-1.module+el8.3.0+6423+e4cb6418.aarch64.rpm
RedHatanys390xlibvirt-daemon-driver-storage-logical-debuginfo< 6.0.0-28.module+el8.3.0+7827+5e65edd7libvirt-daemon-driver-storage-logical-debuginfo-6.0.0-28.module+el8.3.0+7827+5e65edd7.s390x.rpm
RedHatanyppc64lelibiscsi-utils< 1.18.0-8.module+el8.1.0+4066+0f1aadablibiscsi-utils-1.18.0-8.module+el8.1.0+4066+0f1aadab.ppc64le.rpm
RedHatanyaarch64libvirt-daemon-driver-storage-gluster< 6.0.0-28.module+el8.3.0+7827+5e65edd7libvirt-daemon-driver-storage-gluster-6.0.0-28.module+el8.3.0+7827+5e65edd7.aarch64.rpm
RedHatanyppc64lelibvirt-libs< 6.0.0-28.module+el8.3.0+7827+5e65edd7libvirt-libs-6.0.0-28.module+el8.3.0+7827+5e65edd7.ppc64le.rpm
RedHatanyaarch64libvirt-daemon-driver-storage< 6.0.0-28.module+el8.3.0+7827+5e65edd7libvirt-daemon-driver-storage-6.0.0-28.module+el8.3.0+7827+5e65edd7.aarch64.rpm
RedHatanyx86_64netcf< 0.2.8-12.module+el8.1.0+4066+0f1aadabnetcf-0.2.8-12.module+el8.1.0+4066+0f1aadab.x86_64.rpm
RedHatanyi686netcf-libs-debuginfo< 0.2.8-12.module+el8.1.0+4066+0f1aadabnetcf-libs-debuginfo-0.2.8-12.module+el8.1.0+4066+0f1aadab.i686.rpm
Rows per page:
1-10 of 8191

8.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.009 Low

EPSS

Percentile

82.6%