Executive Summary
Summary | |
---|---|
Title | virt:rhel security, bug fix, and enhancement update |
Informations | |||
---|---|---|---|
Name | RHSA-2019:3345 | First vendor Publication | 2019-11-05 |
Vendor | RedHat | Last vendor Modification | 2019-11-05 |
Severity (Vendor) | N/A | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: An update for the virt:rhel module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat CodeReady Linux Builder (v. 8) - aarch64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux AppStream (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64 3. Description: Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * ntfs-3g: heap-based buffer overflow leads to local root privilege escalation (CVE-2019-9755) * QEMU: slirp: information leakage in tcp_emu() due to uninitialized stack variables (CVE-2019-9824) * QEMU: qxl: null pointer dereference while releasing spice resources (CVE-2019-12155) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1531543 - [RFE] add iommu support to virtio-gpu 1662272 - Boot guest with device assignment+vIOMMU, qemu prompts "vtd_interrupt_remap_msi: MSI address low 32 bit invalid: 0x0" when first rebooting guest 1664463 - Modify iotest behavior to include luks and nbd and fail build if iotests fail 1667249 - Fail to launch AMD SEV VM with assigned PCI device 1673010 - Local VM and migrated VM on the same host can run with same RAW file as visual disk source while without shareable configured or lock manager enabled 1673396 - qemu-kvm core dumped after hotplug the deleted disk with iothread parameter 1673401 - Qemu core dump when start guest with two disks using same drive 1678515 - CVE-2019-9824 QEMU: slirp: information leakage in tcp_emu() due to uninitialized stack variables 1678979 - qemu-img convert abort when converting image with unaligned size (qemu-img: block/io.c:2134: bdrv_co_block_status: Assertion `*pnum && (((*pnum) % (align)) == 0) && align > offset - aligned_offset\' failed) 1679483 - Use a better icon for RHEL 7+ guests 1679966 - virt-inspector fails with "error: int_of_string" on a Linux image when /etc/fstab contains a partionless device 1680231 - severe performance impact using luks format 1683681 - libvirt: Can't create ppc64 guests with graphics and no USB mouse 1684383 - qemu crashed when take screenshot for 2nd head of virtio video device if the display not opened by virt-viewer 1685151 - Guest will be destroyed if autostarted pool is destroyed and libvirtd restarted 1686895 - Enhance detection of host CPU model to avoid guesses based on fea.ture list length 1687541 - qemu aborted when start guest with a big iothreads 1687596 - [Intel 8.1 BUG][KVM][Crystal Ridge]object_get_canonical_path_component: assertion failed: (obj->parent != NULL) 1688062 - Include of the updated rhev-apt in virt-v2v 1689297 - RFE: rewrite cgroups code to support v2 subsystem 1691356 - Network filters are not honouring explicitly listed parameters for MAC 1691624 - CVE-2019-9755 ntfs-3g: heap-based buffer overflow leads to local root privilege escalation 1693299 - virsh nodedev-list --cap net can not list all the network device when modprobe ib_umad 1693433 - [RFE] - libvirt support for cascade lake cpu - Slow Train 1694148 - QEMU image locking needn't double open fd number, and it should not fail when attempting to release locks 1697627 - CPU mode=host-model needs to include MSR features 1698133 - Live migration fail with unsafe error when GPFS is used as shared filesystem 1707192 - implement missing reset handler for cfi.pflash01 - slow train 1707598 - qemu-iotest 182 fails without device hotplugging support 1707706 - /builddir/build/BUILD/qemu-2.12.0/target/i386/kvm.c:2031: kvm_put_msrs: Assertion `ret == cpu->kvm_msr_buf->nmsrs' failed. 1710575 - Incorrect capacity and allocation fields in iscsi pool XML 1712670 - CVE-2019-12155 QEMU: qxl: null pointer dereference while releasing spice resources 1712810 - src packages are listed in virt rhel module for RHEL8.0.0.1 and there are some problems about version checking with virt rhel module. 1712946 - qemu-kvm build is broken due to spice_qxl_set_max_monitors being deprecated 1714933 - Disable VXHS in qemu-kvm 1716347 - Qemu Core dump when quit vm that's in status "paused(io-error)" with data plane enabled 1716907 - internal error: Failed to parse bitmap '' when starting guest 1716908 - 'cannot set CPU affinity' error when starting guest 1717088 - libvirt still doesn't relabel sockets in nbd: backing URLs 1719578 - VM failed to start with error "failed to install seccomp syscall filter in the kernel" 1721434 - virsh command delay issue on DPDK node 1721983 - qemu-kvm can't be build with new gluster version (6.0.6) 1722668 - Do not require glusterfs on i686 1722735 - Fix build with current libssh 1727821 - Failed to convert a source image to the qcow2 image encrypted by luks 1728530 - libvirtd crashes non deterministically when trying to destroy a guest 1728657 - 'qemu-io write' to a raw image over libgfapi fails 1728958 - Hot unplug vfio-pci NIC devices from sev guest will cause qemu-kvm: sev_ram_block_removed: failed to unregister region 1729675 - Please backport upstream libvirt commit 87b4e1cd7e7e ("docs: schemas: Decouple the virtio options from each other", 2019-01-04) 1732642 - enable the virtio-net frontend to work with the vhost-net backend in SEV guests 1737790 - improve error message "error: internal error: Duplicate key" 1738839 - I/O error when virtio-blk disk is backed by a raw image on 4k disk 1738886 - virt-v2v: Use scp -T in -i vmx -it ssh mode 1740797 - Disable memfd in QEMU 1741825 - [cgroup_v2] Error happened and xml not changed when use blkiotune to set blk cgroup values 1741837 - [cgroup_v2] Cannot get and set cpu cgroup params due to cpu.max error 1742819 - Remove iotests from qemu-kvm builds [RHEL 8.1.0] 1744415 - Backport support for count cache flush Spectre v2 mitigation [slow train] 1747185 - "filtered-features" QOM property is not available 1747440 - [cgroup_v2] Crash happens when set cpu related cgroup values by “schedinfo†1749227 - [cgroup_v2] schedinfo cmd cannot set vcpu/emulator/global/iothread period values |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2019-3345.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
33 % | CWE-787 | Out-of-bounds Write (CWE/SANS Top 25) |
33 % | CWE-476 | NULL Pointer Dereference |
33 % | CWE-191 | Integer Underflow (Wrap or Wraparound) |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 2 | |
Application | 1 | |
Os | 1 | |
Os | 3 | |
Os | 1 | |
Os | 2 | |
Os | 2 |
Alert History
Date | Informations |
---|---|
2020-03-19 13:19:31 |
|