First published: Mon Jul 29 2019(Updated: )
Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.<br>Security Fix(es):<br><li> QEMU: slirp: heap buffer overflow in tcp_emu() (CVE-2019-6778)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/qemu-kvm | <1.5.3-160.el7_6.3 | 1.5.3-160.el7_6.3 |
redhat/qemu-img | <1.5.3-160.el7_6.3 | 1.5.3-160.el7_6.3 |
redhat/qemu-kvm | <1.5.3-160.el7_6.3 | 1.5.3-160.el7_6.3 |
redhat/qemu-kvm-common | <1.5.3-160.el7_6.3 | 1.5.3-160.el7_6.3 |
redhat/qemu-kvm-debuginfo | <1.5.3-160.el7_6.3 | 1.5.3-160.el7_6.3 |
redhat/qemu-kvm-tools | <1.5.3-160.el7_6.3 | 1.5.3-160.el7_6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2019:1883 is classified as important.
RHSA-2019:1883 addresses a heap buffer overflow in tcp_emu() within the QEMU slirp component.
To fix RHSA-2019:1883, upgrade to the qemu-kvm packages version 1.5.3-160.el7_6.3 or later.
Affected packages include qemu-kvm, qemu-img, qemu-kvm-common, and qemu-kvm-tools at versions prior to 1.5.3-160.el7_6.3.
There are no specific workarounds provided for RHSA-2019:1883, and the recommended action is to apply the security update.