-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: qemu-kvm security and bug fix update Advisory ID: RHSA-2023:5094-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2023:5094 Issue date: 2023-09-12 CVE Names: CVE-2023-3354 ===================================================================== 1. Summary: An update for qemu-kvm is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AppStream (v. 9) - aarch64, ppc64le, s390x, x86_64 3. Description: Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Security Fix(es): * QEMU: VNC: improper I/O watch removal in TLS handshake can lead to remote unauthenticated denial of service (CVE-2023-3354) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * [qemu-kvm] rhel guest failed boot with multi disks on error Failed to start udev Wait for Complete Device Initialization (BZ#2211923) * [rhel9.2] hotplug/hotunplug mlx vdpa device to the occupied addr port, then qemu core dump occurs after shutdown guest (BZ#2227721) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 2211923 - [qemu-kvm] rhel guest failed boot with multi disks on error Failed to start udev Wait for Complete Device Initialization [rhel-9.2.0.z] 2216478 - CVE-2023-3354 QEMU: VNC: improper I/O watch removal in TLS handshake can lead to remote unauthenticated denial of service 2227721 - [rhel9.2] hotplug/hotunplug mlx vdpa device to the occupied addr port, then qemu core dump occurs after shutdown guest [rhel-9.2.0.z] 6. Package List: Red Hat Enterprise Linux AppStream (v. 9): Source: qemu-kvm-7.2.0-14.el9_2.5.src.rpm aarch64: qemu-guest-agent-7.2.0-14.el9_2.5.aarch64.rpm qemu-guest-agent-debuginfo-7.2.0-14.el9_2.5.aarch64.rpm qemu-img-7.2.0-14.el9_2.5.aarch64.rpm qemu-img-debuginfo-7.2.0-14.el9_2.5.aarch64.rpm qemu-kvm-7.2.0-14.el9_2.5.aarch64.rpm qemu-kvm-audio-pa-7.2.0-14.el9_2.5.aarch64.rpm qemu-kvm-audio-pa-debuginfo-7.2.0-14.el9_2.5.aarch64.rpm qemu-kvm-block-curl-7.2.0-14.el9_2.5.aarch64.rpm qemu-kvm-block-curl-debuginfo-7.2.0-14.el9_2.5.aarch64.rpm qemu-kvm-block-rbd-7.2.0-14.el9_2.5.aarch64.rpm qemu-kvm-block-rbd-debuginfo-7.2.0-14.el9_2.5.aarch64.rpm qemu-kvm-common-7.2.0-14.el9_2.5.aarch64.rpm qemu-kvm-common-debuginfo-7.2.0-14.el9_2.5.aarch64.rpm qemu-kvm-core-7.2.0-14.el9_2.5.aarch64.rpm qemu-kvm-core-debuginfo-7.2.0-14.el9_2.5.aarch64.rpm qemu-kvm-debuginfo-7.2.0-14.el9_2.5.aarch64.rpm qemu-kvm-debugsource-7.2.0-14.el9_2.5.aarch64.rpm qemu-kvm-device-display-virtio-gpu-7.2.0-14.el9_2.5.aarch64.rpm qemu-kvm-device-display-virtio-gpu-debuginfo-7.2.0-14.el9_2.5.aarch64.rpm qemu-kvm-device-display-virtio-gpu-pci-7.2.0-14.el9_2.5.aarch64.rpm qemu-kvm-device-display-virtio-gpu-pci-debuginfo-7.2.0-14.el9_2.5.aarch64.rpm qemu-kvm-device-usb-host-7.2.0-14.el9_2.5.aarch64.rpm qemu-kvm-device-usb-host-debuginfo-7.2.0-14.el9_2.5.aarch64.rpm qemu-kvm-docs-7.2.0-14.el9_2.5.aarch64.rpm qemu-kvm-tests-debuginfo-7.2.0-14.el9_2.5.aarch64.rpm qemu-kvm-tools-7.2.0-14.el9_2.5.aarch64.rpm qemu-kvm-tools-debuginfo-7.2.0-14.el9_2.5.aarch64.rpm qemu-pr-helper-7.2.0-14.el9_2.5.aarch64.rpm qemu-pr-helper-debuginfo-7.2.0-14.el9_2.5.aarch64.rpm ppc64le: qemu-guest-agent-7.2.0-14.el9_2.5.ppc64le.rpm qemu-guest-agent-debuginfo-7.2.0-14.el9_2.5.ppc64le.rpm qemu-img-7.2.0-14.el9_2.5.ppc64le.rpm qemu-img-debuginfo-7.2.0-14.el9_2.5.ppc64le.rpm qemu-kvm-debuginfo-7.2.0-14.el9_2.5.ppc64le.rpm qemu-kvm-debugsource-7.2.0-14.el9_2.5.ppc64le.rpm s390x: qemu-guest-agent-7.2.0-14.el9_2.5.s390x.rpm qemu-guest-agent-debuginfo-7.2.0-14.el9_2.5.s390x.rpm qemu-img-7.2.0-14.el9_2.5.s390x.rpm qemu-img-debuginfo-7.2.0-14.el9_2.5.s390x.rpm qemu-kvm-7.2.0-14.el9_2.5.s390x.rpm qemu-kvm-audio-pa-7.2.0-14.el9_2.5.s390x.rpm qemu-kvm-audio-pa-debuginfo-7.2.0-14.el9_2.5.s390x.rpm qemu-kvm-block-curl-7.2.0-14.el9_2.5.s390x.rpm qemu-kvm-block-curl-debuginfo-7.2.0-14.el9_2.5.s390x.rpm qemu-kvm-block-rbd-7.2.0-14.el9_2.5.s390x.rpm qemu-kvm-block-rbd-debuginfo-7.2.0-14.el9_2.5.s390x.rpm qemu-kvm-common-7.2.0-14.el9_2.5.s390x.rpm qemu-kvm-common-debuginfo-7.2.0-14.el9_2.5.s390x.rpm qemu-kvm-core-7.2.0-14.el9_2.5.s390x.rpm qemu-kvm-core-debuginfo-7.2.0-14.el9_2.5.s390x.rpm qemu-kvm-debuginfo-7.2.0-14.el9_2.5.s390x.rpm qemu-kvm-debugsource-7.2.0-14.el9_2.5.s390x.rpm qemu-kvm-device-display-virtio-gpu-7.2.0-14.el9_2.5.s390x.rpm qemu-kvm-device-display-virtio-gpu-ccw-7.2.0-14.el9_2.5.s390x.rpm qemu-kvm-device-display-virtio-gpu-ccw-debuginfo-7.2.0-14.el9_2.5.s390x.rpm qemu-kvm-device-display-virtio-gpu-debuginfo-7.2.0-14.el9_2.5.s390x.rpm qemu-kvm-device-usb-host-7.2.0-14.el9_2.5.s390x.rpm qemu-kvm-device-usb-host-debuginfo-7.2.0-14.el9_2.5.s390x.rpm qemu-kvm-docs-7.2.0-14.el9_2.5.s390x.rpm qemu-kvm-tests-debuginfo-7.2.0-14.el9_2.5.s390x.rpm qemu-kvm-tools-7.2.0-14.el9_2.5.s390x.rpm qemu-kvm-tools-debuginfo-7.2.0-14.el9_2.5.s390x.rpm qemu-pr-helper-7.2.0-14.el9_2.5.s390x.rpm qemu-pr-helper-debuginfo-7.2.0-14.el9_2.5.s390x.rpm x86_64: qemu-guest-agent-7.2.0-14.el9_2.5.x86_64.rpm qemu-guest-agent-debuginfo-7.2.0-14.el9_2.5.x86_64.rpm qemu-img-7.2.0-14.el9_2.5.x86_64.rpm qemu-img-debuginfo-7.2.0-14.el9_2.5.x86_64.rpm qemu-kvm-7.2.0-14.el9_2.5.x86_64.rpm qemu-kvm-audio-pa-7.2.0-14.el9_2.5.x86_64.rpm qemu-kvm-audio-pa-debuginfo-7.2.0-14.el9_2.5.x86_64.rpm qemu-kvm-block-curl-7.2.0-14.el9_2.5.x86_64.rpm qemu-kvm-block-curl-debuginfo-7.2.0-14.el9_2.5.x86_64.rpm qemu-kvm-block-rbd-7.2.0-14.el9_2.5.x86_64.rpm qemu-kvm-block-rbd-debuginfo-7.2.0-14.el9_2.5.x86_64.rpm qemu-kvm-common-7.2.0-14.el9_2.5.x86_64.rpm qemu-kvm-common-debuginfo-7.2.0-14.el9_2.5.x86_64.rpm qemu-kvm-core-7.2.0-14.el9_2.5.x86_64.rpm qemu-kvm-core-debuginfo-7.2.0-14.el9_2.5.x86_64.rpm qemu-kvm-debuginfo-7.2.0-14.el9_2.5.x86_64.rpm qemu-kvm-debugsource-7.2.0-14.el9_2.5.x86_64.rpm qemu-kvm-device-display-virtio-gpu-7.2.0-14.el9_2.5.x86_64.rpm qemu-kvm-device-display-virtio-gpu-debuginfo-7.2.0-14.el9_2.5.x86_64.rpm qemu-kvm-device-display-virtio-gpu-pci-7.2.0-14.el9_2.5.x86_64.rpm qemu-kvm-device-display-virtio-gpu-pci-debuginfo-7.2.0-14.el9_2.5.x86_64.rpm qemu-kvm-device-display-virtio-vga-7.2.0-14.el9_2.5.x86_64.rpm qemu-kvm-device-display-virtio-vga-debuginfo-7.2.0-14.el9_2.5.x86_64.rpm qemu-kvm-device-usb-host-7.2.0-14.el9_2.5.x86_64.rpm qemu-kvm-device-usb-host-debuginfo-7.2.0-14.el9_2.5.x86_64.rpm qemu-kvm-device-usb-redirect-7.2.0-14.el9_2.5.x86_64.rpm qemu-kvm-device-usb-redirect-debuginfo-7.2.0-14.el9_2.5.x86_64.rpm qemu-kvm-docs-7.2.0-14.el9_2.5.x86_64.rpm qemu-kvm-tests-debuginfo-7.2.0-14.el9_2.5.x86_64.rpm qemu-kvm-tools-7.2.0-14.el9_2.5.x86_64.rpm qemu-kvm-tools-debuginfo-7.2.0-14.el9_2.5.x86_64.rpm qemu-kvm-ui-egl-headless-7.2.0-14.el9_2.5.x86_64.rpm qemu-kvm-ui-egl-headless-debuginfo-7.2.0-14.el9_2.5.x86_64.rpm qemu-kvm-ui-opengl-7.2.0-14.el9_2.5.x86_64.rpm qemu-kvm-ui-opengl-debuginfo-7.2.0-14.el9_2.5.x86_64.rpm qemu-pr-helper-7.2.0-14.el9_2.5.x86_64.rpm qemu-pr-helper-debuginfo-7.2.0-14.el9_2.5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2023-3354 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJlAINPAAoJENzjgjWX9erEgIwP/2iGNJSMFxxAOxpKYALKcy84 QIYL7xnu1udLLIlSKR8yLQxaayRHb0/hco1i+rLNzrpB/rvT7ZpesgngnbW+i5bH yhIG9zH09jsvSdj6IikI47158gV7z87gxW8K1+c8DCy10RC88BUu7xMcJZmL4B2d YmhI6ULoI4otDCATfFUu81MeEfBYbLhIcIBhC6KcIiL0I6dsM/fmNz/TrUVkk5Z2 H1i22XE7ktvVUOFcIfHQ1l2AYZdrA/NEskOx6vqkCiUk4a0tOOmsdzxziY1JK2A4 KjpHzb2FRN4uw2dozROcSNOIMO1fWRreVbascTQzOG42KHk29aK6WLTd4AeHgGL5 eFTLxsciDfNgN+R2nxSQ3zqS8hDfcHNjjII5LG6wVpRq/sSkojBPBUSqaUfoKElT KOri4A+czHNE35eHOT4lSIxtRtpsNEcIMx80puWmkT74N/Vlfz515QWRPpnYdT9A eYF4GhwKOj52ieAd7+UGIkDS7zJROo3mqayjs/C2bbIDeJW8Yt8ALcwhYOMCwRsf DBiQSgOsha+bxdEnXibFe8qAdw5ftmxLYKau8ePFgjW+8J5xQ3I3iThWQblXRhaM 6pLY4qug3kQrRyvdKc6WmxnaQeASEILo1ya5BxOokDE7Ly/e+wHGt66b32eLTJnS oYDI7EhxhjO7S9ziTmRZ =DeRV -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce