-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Important: redhat-virtualization-host security update
Advisory ID:       RHSA-2019:2889-01
Product:           Red Hat Virtualization
Advisory URL:      https://access.redhat.com/errata/RHSA-2019:2889
Issue date:        2019-09-24
CVE Names:         CVE-2019-14835 
====================================================================
1. Summary:

An update for redhat-release-virtualization-host and
redhat-virtualization-host is now available for Red Hat Virtualization 4
for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

RHEL 7-based RHEV-H for RHEV 4 (build requirements) - noarch, x86_64
Red Hat Virtualization 4 Hypervisor for RHEL 7 - noarch

3. Description:

The redhat-virtualization-host packages provide the Red Hat Virtualization
Host. Red Hat Virtualization Hosts (RHVH) are installed using a special
build of Red Hat Enterprise Linux with only the packages required to host
virtual machines. RHVH features a Cockpit user interface for monitoring the
host's resources and performing administrative tasks. 

The following packages have been upgraded to a later upstream version:
redhat-release-virtualization-host (4.3.5), redhat-virtualization-host
(4.3.5). (BZ#1751436, BZ#1754063)

Security Fix(es):

* A buffer overflow flaw was found in the way Linux kernel's vhost
functionality that translates virtqueue buffers to IOVs, logged the buffer
descriptors during migration. A privileged guest user able to pass
descriptors with invalid length to the host when migration is underway,
could use this flaw to increase their privileges on the host.
(CVE-2019-14835)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/2974891

5. Bugs fixed (https://bugzilla.redhat.com/):

1750727 - CVE-2019-14835 kernel: vhost-net: guest to host kernel escape during migration
1754063 - Rebase RHV-H 4.3.5 on RHEL 7.7

6. Package List:

Red Hat Virtualization 4 Hypervisor for RHEL 7:

Source:
redhat-virtualization-host-4.3.5-20190920.0.el7_7.src.rpm

noarch:
redhat-virtualization-host-image-update-4.3.5-20190920.0.el7_7.noarch.rpm

RHEL 7-based RHEV-H for RHEV 4 (build requirements):

Source:
redhat-release-virtualization-host-4.3.5-4.el7ev.src.rpm
redhat-virtualization-host-4.3.5-20190920.0.el7_7.src.rpm

noarch:
redhat-virtualization-host-image-update-4.3.5-20190920.0.el7_7.noarch.rpm
redhat-virtualization-host-image-update-placeholder-4.3.5-4.el7ev.noarch.rpm

x86_64:
redhat-release-virtualization-host-4.3.5-4.el7ev.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-14835
https://access.redhat.com/security/vulnerabilities/kernel-vhost
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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qVhz
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2019-2889:01 Important: redhat-virtualization-host security

An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7

Summary

The redhat-virtualization-host packages provide the Red Hat Virtualization Host. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks.
The following packages have been upgraded to a later upstream version: redhat-release-virtualization-host (4.3.5), redhat-virtualization-host (4.3.5). (BZ#1751436, BZ#1754063)
Security Fix(es):
* A buffer overflow flaw was found in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host. (CVE-2019-14835)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/2974891

References

https://access.redhat.com/security/cve/CVE-2019-14835 https://access.redhat.com/security/vulnerabilities/kernel-vhost https://access.redhat.com/security/updates/classification/#important

Package List

Red Hat Virtualization 4 Hypervisor for RHEL 7:
Source: redhat-virtualization-host-4.3.5-20190920.0.el7_7.src.rpm
noarch: redhat-virtualization-host-image-update-4.3.5-20190920.0.el7_7.noarch.rpm
RHEL 7-based RHEV-H for RHEV 4 (build requirements):
Source: redhat-release-virtualization-host-4.3.5-4.el7ev.src.rpm redhat-virtualization-host-4.3.5-20190920.0.el7_7.src.rpm
noarch: redhat-virtualization-host-image-update-4.3.5-20190920.0.el7_7.noarch.rpm redhat-virtualization-host-image-update-placeholder-4.3.5-4.el7ev.noarch.rpm
x86_64: redhat-release-virtualization-host-4.3.5-4.el7ev.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2019:2889-01
Product: Red Hat Virtualization
Advisory URL: https://access.redhat.com/errata/RHSA-2019:2889
Issued Date: : 2019-09-24
CVE Names: CVE-2019-14835

Topic

An update for redhat-release-virtualization-host andredhat-virtualization-host is now available for Red Hat Virtualization 4for Red Hat Enterprise Linux 7.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

RHEL 7-based RHEV-H for RHEV 4 (build requirements) - noarch, x86_64

Red Hat Virtualization 4 Hypervisor for RHEL 7 - noarch


Bugs Fixed

1750727 - CVE-2019-14835 kernel: vhost-net: guest to host kernel escape during migration

1754063 - Rebase RHV-H 4.3.5 on RHEL 7.7


Related News