You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa qemu-kvm-rhev

Sigurnosni nedostaci programskog paketa qemu-kvm-rhev

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LRH

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: qemu-kvm-rhev security, bug fix, and enhancement update
Advisory ID: RHSA-2020:1216-01
Product: Red Hat Virtualization
Advisory URL: https://access.redhat.com/errata/RHSA-2020:1216
Issue date: 2020-03-31
CVE Names: CVE-2019-12155 CVE-2019-14378 CVE-2020-1711
=====================================================================

1. Summary:

An update for qemu-kvm-rhev is now available for Red Hat Virtualization 4
for Red Hat Enterprise Linux 7 and Red Hat Virtualization Engine 4.3.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

RHV-M 4.3 – x86_64
Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts – ppc64le, x86_64

3. Description:

KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on a variety of architectures. The qemu-kvm-rhev packages provide the
user-space component for running virtual machines that use KVM in
environments managed by Red Hat products.

Security Fix(es):

* QEMU: slirp: heap buffer overflow during packet reassembly
(CVE-2019-14378)

* QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI
Server (CVE-2020-1711)

* QEMU: qxl: null pointer dereference while releasing spice resources
(CVE-2019-12155)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fix(es):

* After host update, older windows clients have large time drift
(BZ#1639098)

* [v2v] Migration performance regression (BZ#1648622)

* Live storage migration fails with: TimeoutError: Timed out during
operation: cannot acquire state change lock (held by
monitor=remoteDispatchConnectGetAllDomainStats) and the VM becomes ‘Not
Responding’ (BZ#1665256)

* QEMU gets stuck on resume/cont call from libvirt (BZ#1673546)

* [Intel 7.8 Bug] [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled
in VM qemu-kvm-rhev (BZ#1709972)

* qemu aborts in blockCommit: qemu-kvm: block.c:3486: bdrv_replace_node:
Assertion `!({ _Static_assert(!(sizeof(*&from->in_flight) > 8), “not
expecting: ” “sizeof(*&from->in_flight) > ATOMIC_REG_SIZE”);
__atomic_load_n(&from->in_flight, 0); })’ failed. (BZ#1711643)

* ccid: Fix incorrect dwProtocol advertisement of T=0 (BZ#1721522)

* Fail to migrate a rhel6.10-mt7.6 guest with dimm device (BZ#1724048)

* qemu-kvm: backport cpuidle-haltpoll support (BZ#1734502)

* qemu, qemu-img fail to detect alignment with XFS and Gluster/XFS on 4k
block device (BZ#1743365)

* ISST-LTE:RHV4.3 on RHEL7.6 kvm host:Power8:Tuleta-L:lotg7: call traces
dumped on guest while performing guest migration (qemu-kvm-rhev)
(BZ#1743508)

* qemu coredump: qemu-kvm: block/create.c:68: qmp_blockdev_create:
Assertion `drv’ failed (BZ#1746224)

* [Data plane]virtio_scsi_ctx_check: Assertion
`blk_get_aio_context(d->conf.blk) == s->ctx’ failed when unplug a device
that running block stream on it (BZ#1764120)

* qemu-kvm crashes when Windows VM is migrated with multiqueue (BZ#1775251)

Enhancement(s):

* [Intel 7.8 FEAT] MDS_NO exposure to guest – qemu-kvm-rhev (BZ#1716726)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/2974891

After installing this update, shut down all running virtual machines. Once
all virtual machines have shut down, start them again for this update to
take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1648622 – [v2v] Migration performance regression
1665256 – Live storage migration fails with: TimeoutError: Timed out during operation: cannot acquire state change lock (held by monitor=remoteDispatchConnectGetAllDomainStats) and the VM becomes ‘Not Responding’
1711643 – qemu aborts in blockCommit: qemu-kvm: block.c:3486: bdrv_replace_node: Assertion `!({ _Static_assert(!(sizeof(*&from->in_flight) > 8), “not expecting: ” “sizeof(*&from->in_flight) > ATOMIC_REG_SIZE”); __atomic_load_n(&from->in_flight, 0); })’ failed.
1712670 – CVE-2019-12155 QEMU: qxl: null pointer dereference while releasing spice resources
1721522 – ccid: Fix incorrect dwProtocol advertisement of T=0
1724048 – Fail to migrate a rhel6.10-mt7.6 guest with dimm device
1734502 – qemu-kvm: backport cpuidle-haltpoll support
1734745 – CVE-2019-14378 QEMU: slirp: heap buffer overflow during packet reassembly
1743365 – qemu, qemu-img fail to detect alignment with XFS and Gluster/XFS on 4k block device
1746224 – qemu coredump: qemu-kvm: block/create.c:68: qmp_blockdev_create: Assertion `drv’ failed
1764120 – [Data plane]virtio_scsi_ctx_check: Assertion `blk_get_aio_context(d->conf.blk) == s->ctx’ failed when unplug a device that running block stream on it
1775251 – qemu-kvm crashes when Windows VM is migrated with multiqueue
1794290 – CVE-2020-1711 QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server

6. Package List:

Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts:

Source:
qemu-kvm-rhev-2.12.0-44.el7.src.rpm

ppc64le:
qemu-img-rhev-2.12.0-44.el7.ppc64le.rpm
qemu-kvm-common-rhev-2.12.0-44.el7.ppc64le.rpm
qemu-kvm-rhev-2.12.0-44.el7.ppc64le.rpm
qemu-kvm-rhev-debuginfo-2.12.0-44.el7.ppc64le.rpm
qemu-kvm-tools-rhev-2.12.0-44.el7.ppc64le.rpm

x86_64:
qemu-img-rhev-2.12.0-44.el7.x86_64.rpm
qemu-kvm-common-rhev-2.12.0-44.el7.x86_64.rpm
qemu-kvm-rhev-2.12.0-44.el7.x86_64.rpm
qemu-kvm-rhev-debuginfo-2.12.0-44.el7.x86_64.rpm
qemu-kvm-tools-rhev-2.12.0-44.el7.x86_64.rpm

RHV-M 4.3:

Source:
qemu-kvm-rhev-2.12.0-44.el7.src.rpm

x86_64:
qemu-img-rhev-2.12.0-44.el7.x86_64.rpm
qemu-kvm-common-rhev-2.12.0-44.el7.x86_64.rpm
qemu-kvm-rhev-2.12.0-44.el7.x86_64.rpm
qemu-kvm-rhev-debuginfo-2.12.0-44.el7.x86_64.rpm
qemu-kvm-tools-rhev-2.12.0-44.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-12155
https://access.redhat.com/security/cve/CVE-2019-14378
https://access.redhat.com/security/cve/CVE-2020-1711
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=BJlF
—–END PGP SIGNATURE—–


RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

AutorToni Vugdelija
Cert idNCERT-REF-2020-04-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa python-nltk

Otkriven je sigurnosni nedostatak u programskom paketu python-nltk za operacijski sustav openSUSE. Otkriveni nedostatak potencijalnim udaljenim napadačima omogućuje izvođenje 'directory...

Close