QID 239833

Date Published: 2021-11-10

QID 239833: Red Hat Update for virt:rhel and virt-devel:rhel security (RHSA-2021:4191)

kernel-based virtual machine (kvm) offers a full virtualization solution for linux on numerous hardware platforms.
The virt:rhel module contains packages which provide user-space components used to run virtual machines using kvm.
The packages also provide apis for managing and interacting with the virtualized systems.

Security Fix(es):
  • qemu: net: e1000e: use-after-free while sending packets (cve-2020-15859)
  • qemu: slirp: invalid pointer initialization may lead to information disclosure (bootp) (cve-2021-3592)
  • qemu: slirp: invalid pointer initialization may lead to information disclosure (udp6) (cve-2021-3593)
  • qemu: slirp: invalid pointer initialization may lead to information disclosure (udp) (cve-2021-3594)
  • qemu: slirp: invalid pointer initialization may lead to information disclosure (tftp) (cve-2021-3595)
  • libvirt: insecure svirt label generation (cve-2021-3631)
  • libvirt: improper locking on acl failure in virstoragepoollookupbytargetpath api (cve-2021-3667)

Affected Products:

  • Red Hat enterprise linux for x86_64 8 x86_64
  • Red Hat enterprise linux for ibm z systems 8 s390x
  • Red Hat enterprise linux for power, little endian 8 ppc64le
  • Red Hat enterprise linux for arm 64 8 aarch64
  • Red Hat codeready linux builder for x86_64 8 x86_64
  • Red Hat codeready linux builder for power, little endian 8 ppc64le
  • Red Hat codeready linux builder for arm 64 8 aarch64
  • Red Hat codeready linux builder for ibm z systems 8 s390x



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

On successful exploitation, it could allow an attacker to execute code.

  • CVSS V3 rated as Medium - 3.8 severity.
  • CVSS V2 rated as Low - 2.1 severity.
  • Solution
    Upgrade to the latest packages which contain a patch.

    Refer to Refer to :
    Applying Package Updates to RHEL system
    for details.

    Refer to Red Hat security advisory RHSA-2021:4191 Update to address this issue and obtain more information.

    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    RHSA-2021:4191 Red Hat Enterprise Linux URL Logo access.redhat.com/errata/RHSA-2021:4191