Dear Customers,
KernelCare prepared security updates for your system.
Systems with AUTO_UPDATE=True (DEFAULT) in /etc/sysconfig/kcare/kcare.conf will automatically update, and no action is needed for them.
You can manually update the server by running:
/usr/bin/kcarectl --update
Changelog:
rhel7:
CVE-2019-14835: The vulnerability is in vhost/vhost_net kernel module, vhost/vhost_net
is a virtio network backend. The bug happens in the live migrate flow, when migrating,
QEMU needs to know the dirty pages, vhost/vhost_net uses a kernel buffer to record
the dirty log, but it doesn't check the bounds of the log buffer. So we can forge
the desc table in guest, wait for migrate or doing something (like increase host
machine workload or combine a mem leak bug, depends on vendor's migrate schedule
policy) to trigger cloud vendor to migrate this guest. When the guest migrating,
it will make the host kernel log buffer overflow.
cvelist: [CVE-2019-14835]
latest-version: kernel-3.10.0-1062.1.1.el7
oel7:
CVE-2019-14835: The vulnerability is in vhost/vhost_net kernel module, vhost/vhost_net
is a virtio network backend. The bug happens in the live migrate flow, when migrating,
QEMU needs to know the dirty pages, vhost/vhost_net uses a kernel buffer to record
the dirty log, but it doesn't check the bounds of the log buffer. So we can forge
the desc table in guest, wait for migrate or doing something (like increase host
machine workload or combine a mem leak bug, depends on vendor's migrate schedule
policy) to trigger cloud vendor to migrate this guest. When the guest migrating,
it will make the host kernel log buffer overflow.
cvelist: [CVE-2019-14835]
latest-version: kernel-3.10.0-1062.1.1.el7