First published: Tue Mar 03 2020(Updated: )
Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.<br>Security Fix(es):<br><li> hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Enhancement(s):<br><li> [Intel 7.8 FEAT] MDS_NO exposure to guest - qemu-kvm (BZ#1755332)</li>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/qemu-kvm | <1.5.3-160.el7_6.5 | 1.5.3-160.el7_6.5 |
redhat/qemu-img | <1.5.3-160.el7_6.5 | 1.5.3-160.el7_6.5 |
redhat/qemu-kvm | <1.5.3-160.el7_6.5 | 1.5.3-160.el7_6.5 |
redhat/qemu-kvm-common | <1.5.3-160.el7_6.5 | 1.5.3-160.el7_6.5 |
redhat/qemu-kvm-debuginfo | <1.5.3-160.el7_6.5 | 1.5.3-160.el7_6.5 |
redhat/qemu-kvm-tools | <1.5.3-160.el7_6.5 | 1.5.3-160.el7_6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2020:0666 is classified as critical due to the potential impact on security.
To fix RHSA-2020:0666, you should update the qemu-kvm packages to version 1.5.3-160.el7_6.5 or later.
The affected packages in RHSA-2020:0666 include qemu-kvm, qemu-img, qemu-kvm-common, qemu-kvm-debuginfo, and qemu-kvm-tools.
RHSA-2020:0666 addresses the TSX Transaction Asynchronous Abort (TAA) vulnerability in KVM.
There is no formal workaround for RHSA-2020:0666; applying the recommended update is the best mitigation.