First published: Tue Sep 29 2020(Updated: )
Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.<br>Security Fix(es):<br><li> QEMU: usb: out-of-bounds r/w access issue while processing usb packets (CVE-2020-14364)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/qemu-kvm | <1.5.3-160.el7_6.8 | 1.5.3-160.el7_6.8 |
redhat/qemu-img | <1.5.3-160.el7_6.8 | 1.5.3-160.el7_6.8 |
redhat/qemu-kvm | <1.5.3-160.el7_6.8 | 1.5.3-160.el7_6.8 |
redhat/qemu-kvm-common | <1.5.3-160.el7_6.8 | 1.5.3-160.el7_6.8 |
redhat/qemu-kvm-debuginfo | <1.5.3-160.el7_6.8 | 1.5.3-160.el7_6.8 |
redhat/qemu-kvm-tools | <1.5.3-160.el7_6.8 | 1.5.3-160.el7_6.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2020:4052 is classified as important.
To fix RHSA-2020:4052, update the qemu-kvm, qemu-img, and other affected packages to version 1.5.3-160.el7_6.8 or later.
Affected software for RHSA-2020:4052 includes qemu-kvm, qemu-img, qemu-kvm-common, qemu-kvm-debuginfo, and qemu-kvm-tools.
The vulnerability in RHSA-2020:4052 is due to an out-of-bounds read/write access issue in the QEMU usb subsystem.
Yes, RHSA-2020:4052 may affect virtual machine performance and stability if not addressed promptly.