Synopsis
Important: qemu-kvm-rhev security and bug fix update
Type/Severity
Security Advisory: Important
Topic
An update for qemu-kvm-rhev is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 and Red Hat Virtualization Engine 4.3.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products.
Security Fix(es):
- QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378)
- QEMU: qxl: null pointer dereference while releasing spice resources (CVE-2019-12155)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- ccid: Fix incorrect dwProtocol advertisement of T=0 (BZ#1729880)
- QEMU gets stuck on resume/cont call from libvirt (BZ#1741937)
- [v2v] Migration performance regression (BZ#1743322)
- qemu, qemu-img fail to detect alignment with XFS and Gluster/XFS on 4k block device (BZ#1745443)
- qemu-kvm: backport cpuidle-haltpoll support (BZ#1746282)
- qemu aborts in blockCommit: qemu-kvm: block.c:3486 (BZ#1750322)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/2974891
After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.
Affected Products
-
Red Hat Virtualization Manager 4.3 x86_64
-
Red Hat Virtualization 4 x86_64
-
Red Hat Virtualization for IBM Power LE 4 ppc64le
Fixes
- BZ - 1712670 - CVE-2019-12155 QEMU: qxl: null pointer dereference while releasing spice resources
- BZ - 1729880 - ccid: Fix incorrect dwProtocol advertisement of T=0 [rhel-7.7.z]
- BZ - 1734745 - CVE-2019-14378 QEMU: slirp: heap buffer overflow during packet reassembly
- BZ - 1743322 - [v2v] Migration performance regression [rhel-7.7.z]
- BZ - 1745443 - qemu, qemu-img fail to detect alignment with XFS and Gluster/XFS on 4k block device [rhel-7.7.z]
- BZ - 1746282 - qemu-kvm: backport cpuidle-haltpoll support [rhel-7.7.z]
- BZ - 1750322 - qemu aborts in blockCommit: qemu-kvm: block.c:3486 [rhel-7.7.z]
CVEs
References