First published: Tue Apr 21 2020(Updated: )
Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures.<br>Security Fix(es):<br><li> QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server (CVE-2020-1711)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/qemu-kvm-ma | <2.10.0-21.el7_5.5 | 2.10.0-21.el7_5.5 |
redhat/qemu-img-ma | <2.10.0-21.el7_5.5 | 2.10.0-21.el7_5.5 |
redhat/qemu-kvm-common-ma | <2.10.0-21.el7_5.5 | 2.10.0-21.el7_5.5 |
redhat/qemu-kvm-ma-debuginfo | <2.10.0-21.el7_5.5 | 2.10.0-21.el7_5.5 |
redhat/qemu-kvm-tools-ma | <2.10.0-21.el7_5.5 | 2.10.0-21.el7_5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2020:1505 is rated as important.
To fix RHSA-2020:1505, update the qemu-kvm-ma, qemu-img-ma, qemu-kvm-common-ma, qemu-kvm-ma-debuginfo, and qemu-kvm-tools-ma packages to version 2.10.0-21.el7_5.5.
RHSA-2020:1505 affects systems running the qemu-ka packages on IBM z Systems, IBM Power, and 64-bit ARM architectures.
RHSA-2020:1505 addresses security vulnerabilities in the Kernel-based Virtual Machine (KVM) implementation.
There is no specified workaround for RHSA-2020:1505; the recommended action is to apply the update.