6.5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
7.7 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H
0.017 Low
EPSS
Percentile
87.7%
KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products.
Security Fix(es):
QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378)
QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server (CVE-2020-1711)
QEMU: qxl: null pointer dereference while releasing spice resources (CVE-2019-12155)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
After host update, older windows clients have large time drift (BZ#1639098)
[v2v] Migration performance regression (BZ#1648622)
Live storage migration fails with: TimeoutError: Timed out during operation: cannot acquire state change lock (held by monitor=remoteDispatchConnectGetAllDomainStats) and the VM becomes ‘Not Responding’ (BZ#1665256)
QEMU gets stuck on resume/cont call from libvirt (BZ#1673546)
[Intel 7.8 Bug] [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM qemu-kvm-rhev (BZ#1709972)
qemu aborts in blockCommit: qemu-kvm: block.c:3486: bdrv_replace_node: Assertion `!({ _Static_assert(!(sizeof(&from->in_flight) > 8), "not expecting: " "sizeof(&from->in_flight) > ATOMIC_REG_SIZE"); __atomic_load_n(&from->in_flight, 0); })’ failed. (BZ#1711643)
ccid: Fix incorrect dwProtocol advertisement of T=0 (BZ#1721522)
Fail to migrate a rhel6.10-mt7.6 guest with dimm device (BZ#1724048)
qemu-kvm: backport cpuidle-haltpoll support (BZ#1734502)
qemu, qemu-img fail to detect alignment with XFS and Gluster/XFS on 4k block device (BZ#1743365)
ISST-LTE:RHV4.3 on RHEL7.6 kvm host:Power8:Tuleta-L:lotg7: call traces dumped on guest while performing guest migration (qemu-kvm-rhev) (BZ#1743508)
qemu coredump: qemu-kvm: block/create.c:68: qmp_blockdev_create: Assertion `drv’ failed (BZ#1746224)
[Data plane]virtio_scsi_ctx_check: Assertion `blk_get_aio_context(d->conf.blk) == s->ctx’ failed when unplug a device that running block stream on it (BZ#1764120)
qemu-kvm crashes when Windows VM is migrated with multiqueue (BZ#1775251)
Enhancement(s):
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | 7 | x86_64 | qemu-kvm-common-rhev | < 2.12.0-44.el7 | qemu-kvm-common-rhev-2.12.0-44.el7.x86_64.rpm |
RedHat | 7 | ppc64le | qemu-kvm-common-rhev | < 2.12.0-44.el7 | qemu-kvm-common-rhev-2.12.0-44.el7.ppc64le.rpm |
RedHat | 7 | x86_64 | qemu-kvm-rhev | < 2.12.0-44.el7 | qemu-kvm-rhev-2.12.0-44.el7.x86_64.rpm |
RedHat | 7 | ppc64le | qemu-kvm-tools-rhev | < 2.12.0-44.el7 | qemu-kvm-tools-rhev-2.12.0-44.el7.ppc64le.rpm |
RedHat | 7 | x86_64 | qemu-img-rhev | < 2.12.0-44.el7 | qemu-img-rhev-2.12.0-44.el7.x86_64.rpm |
RedHat | 7 | x86_64 | qemu-kvm-rhev-debuginfo | < 2.12.0-44.el7 | qemu-kvm-rhev-debuginfo-2.12.0-44.el7.x86_64.rpm |
RedHat | 7 | x86_64 | qemu-kvm-tools-rhev | < 2.12.0-44.el7 | qemu-kvm-tools-rhev-2.12.0-44.el7.x86_64.rpm |
RedHat | 7 | ppc64le | qemu-kvm-rhev-debuginfo | < 2.12.0-44.el7 | qemu-kvm-rhev-debuginfo-2.12.0-44.el7.ppc64le.rpm |
RedHat | 7 | ppc64le | qemu-img-rhev | < 2.12.0-44.el7 | qemu-img-rhev-2.12.0-44.el7.ppc64le.rpm |
RedHat | 7 | ppc64le | qemu-kvm-rhev | < 2.12.0-44.el7 | qemu-kvm-rhev-2.12.0-44.el7.ppc64le.rpm |
6.5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
7.7 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H
0.017 Low
EPSS
Percentile
87.7%