First published: Fri Aug 09 2019(Updated: )
KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products.<br>Security Fix(es):<br><li> QEMU: slirp: heap buffer overflow in tcp_emu() (CVE-2019-6778)</li> <li> QEMU: rtl8139: integer overflow leads to buffer overflow (CVE-2018-17958)</li> <li> QEMU: net: ignore packets with large size (CVE-2018-17963)</li> <li> QEMU: seccomp: blacklist is not applied to all threads (CVE-2018-15746)</li> <li> QEMU: scsi-generic: possible OOB access while handling inquiry request (CVE-2019-6501)</li> <li> QEMU: slirp: information leakage in tcp_emu() due to uninitialized stack variables (CVE-2019-9824)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Bug Fix(es):<br><li> Update qemu-kvm-rhev for RHEL 7.7 compatibility [OSP-14] (BZ#1728358)</li> <li> Update qemu-kvm-rhev for RHEL 7.7 compatibility [OSP-13] (BZ#1728359)</li> <li> Update qemu-kvm-rhev for RHEL 7.7 compatibility [OSP-10] (BZ#1728360)</li>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/qemu-kvm-rhev | <2.12.0-33.el7 | 2.12.0-33.el7 |
redhat/qemu-img-rhev | <2.12.0-33.el7 | 2.12.0-33.el7 |
redhat/qemu-kvm-common-rhev | <2.12.0-33.el7 | 2.12.0-33.el7 |
redhat/qemu-kvm-rhev | <2.12.0-33.el7 | 2.12.0-33.el7 |
redhat/qemu-kvm-rhev-debuginfo | <2.12.0-33.el7 | 2.12.0-33.el7 |
redhat/qemu-kvm-tools-rhev | <2.12.0-33.el7 | 2.12.0-33.el7 |
redhat/qemu-img-rhev | <2.12.0-33.el7 | 2.12.0-33.el7 |
redhat/qemu-kvm-common-rhev | <2.12.0-33.el7 | 2.12.0-33.el7 |
redhat/qemu-kvm-rhev | <2.12.0-33.el7 | 2.12.0-33.el7 |
redhat/qemu-kvm-rhev-debuginfo | <2.12.0-33.el7 | 2.12.0-33.el7 |
redhat/qemu-kvm-tools-rhev | <2.12.0-33.el7 | 2.12.0-33.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.