- Issued:
- 2020-03-03
- Updated:
- 2020-03-03
RHSA-2020:0666 - Security Advisory
Synopsis
Moderate: qemu-kvm security and enhancement update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for qemu-kvm is now available for Red Hat Enterprise Linux 7.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.
Security Fix(es):
- hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Enhancement(s):
- [Intel 7.8 FEAT] MDS_NO exposure to guest - qemu-kvm (BZ#1755332)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.6 x86_64
- Red Hat Enterprise Linux Server - AUS 7.6 x86_64
- Red Hat Enterprise Linux Server - TUS 7.6 x86_64
- Red Hat Enterprise Linux EUS Compute Node 7.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.6 x86_64
Fixes
- BZ - 1753062 - CVE-2019-11135 hw: TSX Transaction Asynchronous Abort (TAA)
CVEs
Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.6
SRPM | |
---|---|
qemu-kvm-1.5.3-160.el7_6.5.src.rpm | SHA-256: f65ad69a3dd0c6f89e863d82df54d07d308dd99ee78d9714fda9d3f5842554f9 |
x86_64 | |
qemu-img-1.5.3-160.el7_6.5.x86_64.rpm | SHA-256: 4fe6d8bd706f8937cf622b047179d1eed56373c07bc815f5e7393ce59d2227ad |
qemu-kvm-1.5.3-160.el7_6.5.x86_64.rpm | SHA-256: 36d18d213c663ea74f2a6aa28a847fa5b1a694d5ec36a323f69ca9d9cb949563 |
qemu-kvm-common-1.5.3-160.el7_6.5.x86_64.rpm | SHA-256: 15f1f371939f0ef59d3881449cb460447657c4cf96551806b76cad5084c5c240 |
qemu-kvm-debuginfo-1.5.3-160.el7_6.5.x86_64.rpm | SHA-256: c31ed94b900990566c7346794365fd69945f2cb044637e3bb364e8c4cc09db09 |
qemu-kvm-tools-1.5.3-160.el7_6.5.x86_64.rpm | SHA-256: cb8068506542ab87b29e3c9f3832b172df643cef81ad549f47af058c7a0af2a1 |
Red Hat Enterprise Linux Server - AUS 7.6
SRPM | |
---|---|
qemu-kvm-1.5.3-160.el7_6.5.src.rpm | SHA-256: f65ad69a3dd0c6f89e863d82df54d07d308dd99ee78d9714fda9d3f5842554f9 |
x86_64 | |
qemu-img-1.5.3-160.el7_6.5.x86_64.rpm | SHA-256: 4fe6d8bd706f8937cf622b047179d1eed56373c07bc815f5e7393ce59d2227ad |
qemu-kvm-1.5.3-160.el7_6.5.x86_64.rpm | SHA-256: 36d18d213c663ea74f2a6aa28a847fa5b1a694d5ec36a323f69ca9d9cb949563 |
qemu-kvm-common-1.5.3-160.el7_6.5.x86_64.rpm | SHA-256: 15f1f371939f0ef59d3881449cb460447657c4cf96551806b76cad5084c5c240 |
qemu-kvm-debuginfo-1.5.3-160.el7_6.5.x86_64.rpm | SHA-256: c31ed94b900990566c7346794365fd69945f2cb044637e3bb364e8c4cc09db09 |
qemu-kvm-tools-1.5.3-160.el7_6.5.x86_64.rpm | SHA-256: cb8068506542ab87b29e3c9f3832b172df643cef81ad549f47af058c7a0af2a1 |
Red Hat Enterprise Linux Server - TUS 7.6
SRPM | |
---|---|
qemu-kvm-1.5.3-160.el7_6.5.src.rpm | SHA-256: f65ad69a3dd0c6f89e863d82df54d07d308dd99ee78d9714fda9d3f5842554f9 |
x86_64 | |
qemu-img-1.5.3-160.el7_6.5.x86_64.rpm | SHA-256: 4fe6d8bd706f8937cf622b047179d1eed56373c07bc815f5e7393ce59d2227ad |
qemu-kvm-1.5.3-160.el7_6.5.x86_64.rpm | SHA-256: 36d18d213c663ea74f2a6aa28a847fa5b1a694d5ec36a323f69ca9d9cb949563 |
qemu-kvm-common-1.5.3-160.el7_6.5.x86_64.rpm | SHA-256: 15f1f371939f0ef59d3881449cb460447657c4cf96551806b76cad5084c5c240 |
qemu-kvm-debuginfo-1.5.3-160.el7_6.5.x86_64.rpm | SHA-256: c31ed94b900990566c7346794365fd69945f2cb044637e3bb364e8c4cc09db09 |
qemu-kvm-tools-1.5.3-160.el7_6.5.x86_64.rpm | SHA-256: cb8068506542ab87b29e3c9f3832b172df643cef81ad549f47af058c7a0af2a1 |
Red Hat Enterprise Linux EUS Compute Node 7.6
SRPM | |
---|---|
qemu-kvm-1.5.3-160.el7_6.5.src.rpm | SHA-256: f65ad69a3dd0c6f89e863d82df54d07d308dd99ee78d9714fda9d3f5842554f9 |
x86_64 | |
qemu-img-1.5.3-160.el7_6.5.x86_64.rpm | SHA-256: 4fe6d8bd706f8937cf622b047179d1eed56373c07bc815f5e7393ce59d2227ad |
qemu-kvm-1.5.3-160.el7_6.5.x86_64.rpm | SHA-256: 36d18d213c663ea74f2a6aa28a847fa5b1a694d5ec36a323f69ca9d9cb949563 |
qemu-kvm-common-1.5.3-160.el7_6.5.x86_64.rpm | SHA-256: 15f1f371939f0ef59d3881449cb460447657c4cf96551806b76cad5084c5c240 |
qemu-kvm-debuginfo-1.5.3-160.el7_6.5.x86_64.rpm | SHA-256: c31ed94b900990566c7346794365fd69945f2cb044637e3bb364e8c4cc09db09 |
qemu-kvm-tools-1.5.3-160.el7_6.5.x86_64.rpm | SHA-256: cb8068506542ab87b29e3c9f3832b172df643cef81ad549f47af058c7a0af2a1 |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.6
SRPM | |
---|---|
qemu-kvm-1.5.3-160.el7_6.5.src.rpm | SHA-256: f65ad69a3dd0c6f89e863d82df54d07d308dd99ee78d9714fda9d3f5842554f9 |
x86_64 | |
qemu-img-1.5.3-160.el7_6.5.x86_64.rpm | SHA-256: 4fe6d8bd706f8937cf622b047179d1eed56373c07bc815f5e7393ce59d2227ad |
qemu-kvm-1.5.3-160.el7_6.5.x86_64.rpm | SHA-256: 36d18d213c663ea74f2a6aa28a847fa5b1a694d5ec36a323f69ca9d9cb949563 |
qemu-kvm-common-1.5.3-160.el7_6.5.x86_64.rpm | SHA-256: 15f1f371939f0ef59d3881449cb460447657c4cf96551806b76cad5084c5c240 |
qemu-kvm-debuginfo-1.5.3-160.el7_6.5.x86_64.rpm | SHA-256: c31ed94b900990566c7346794365fd69945f2cb044637e3bb364e8c4cc09db09 |
qemu-kvm-tools-1.5.3-160.el7_6.5.x86_64.rpm | SHA-256: cb8068506542ab87b29e3c9f3832b172df643cef81ad549f47af058c7a0af2a1 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.