Important: virt:8.1 and virt-devel:8.1 security update

Related Vulnerabilities: CVE-2020-14364   CVE-2020-1983   CVE-2020-1983   CVE-2020-14364   CVE-2020-1983   CVE-2020-14364  

Synopsis

Important: virt:8.1 and virt-devel:8.1 security update

Type/Severity

Security Advisory: Important

Topic

An update for the virt:8.1 and virt-devel:8.1 modules is now available for Advanced Virtualization for RHEL 8.1.1.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The Advanced Virtualization module provides the user-space component for running virtual machines that use KVM in environments managed by Red Hat products.

Security Fix(es):

  • QEMU: usb: out-of-bounds r/w access issue while processing usb packets (CVE-2020-14364)
  • QEMU: slirp: use-after-free in ip_reass() function in ip_input.c (CVE-2020-1983)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Advanced Virtualization 8 x86_64
  • Red Hat Enterprise Linux Advanced Virtualization (for RHEL Server for IBM Power LE) 8 ppc64le
  • Red Hat Enterprise Linux Advanced Virtualization (for RHEL Server for ARM 64) 8 aarch64
  • Red Hat Enterprise Linux Advanced Virtualization (for RHEL Server for IBM System Z) 8 s390x

Fixes

  • BZ - 1829825 - CVE-2020-1983 QEMU: slirp: use-after-free in ip_reass() function in ip_input.c
  • BZ - 1869201 - CVE-2020-14364 QEMU: usb: out-of-bounds r/w access issue while processing usb packets

CVEs

References