Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2020:0669 - Security Advisory
Issued:
2020-03-03
Updated:
2020-03-03

RHSA-2020:0669 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: qemu-kvm-ma security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for qemu-kvm-ma is now available for Red Hat Enterprise Linux 7.6 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures.

Security Fix(es):

  • QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server (CVE-2020-1711)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.6 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.6 ppc64
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.6 ppc64le
  • Red Hat Enterprise Linux for ARM 64 7 aarch64
  • Red Hat Enterprise Linux for Power 9 7 ppc64le
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.6 ppc64le
  • Red Hat Enterprise Linux for IBM System z (Structure A) 7 s390x

Fixes

  • BZ - 1794290 - CVE-2020-1711 QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server

CVEs

  • CVE-2020-1711

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.6

SRPM
qemu-kvm-ma-2.12.0-18.el7_6.5.src.rpm SHA-256: f2c8365eb58b243e2b82e26edbfb1ffbb1a21c74c50ab4e68c5ca32a2775db23
s390x
qemu-img-ma-2.12.0-18.el7_6.5.s390x.rpm SHA-256: 2863f953d09031faa99dfe4ba29bfe7791d788bb7aaaf36fa6e02e591a30cb10
qemu-kvm-common-ma-2.12.0-18.el7_6.5.s390x.rpm SHA-256: 886e142c05be69eb5e008146470fa33863497ac8e0c029e92f23134fac0b489f
qemu-kvm-ma-2.12.0-18.el7_6.5.s390x.rpm SHA-256: 222fa85416a30d2d9b5628ae3833d4d44cddd4995b673dbd12d9c5316e562501
qemu-kvm-ma-debuginfo-2.12.0-18.el7_6.5.s390x.rpm SHA-256: 62dee34d803d746e9405d59ae336f663f2b256fd84ea39dcb4e5553069d8c454
qemu-kvm-tools-ma-2.12.0-18.el7_6.5.s390x.rpm SHA-256: 0753caf9c72747b3d8829d06104b474d65bfc0944345aa12ae12c5e6cf02de88

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.6

SRPM
qemu-kvm-ma-2.12.0-18.el7_6.5.src.rpm SHA-256: f2c8365eb58b243e2b82e26edbfb1ffbb1a21c74c50ab4e68c5ca32a2775db23
ppc64
qemu-img-ma-2.12.0-18.el7_6.5.ppc64.rpm SHA-256: 7bf33051e1adab3aef5b2eb6d7ace691b54b0516f3c5568a37e180a43f054cd2
qemu-kvm-ma-debuginfo-2.12.0-18.el7_6.5.ppc64.rpm SHA-256: e3004c4fa47edbef5d90749eb46ef0c5e1b17694700ecd68ceb0f60c4685a8a6

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.6

SRPM
qemu-kvm-ma-2.12.0-18.el7_6.5.src.rpm SHA-256: f2c8365eb58b243e2b82e26edbfb1ffbb1a21c74c50ab4e68c5ca32a2775db23
ppc64le
qemu-img-ma-2.12.0-18.el7_6.5.ppc64le.rpm SHA-256: 286e2a740e3e132df930701103f5cf8a87d07d2484b7ce87744efc65d4134a8b
qemu-kvm-common-ma-2.12.0-18.el7_6.5.ppc64le.rpm SHA-256: 5c769fd96d76048a3d9edced767e075ae44c5b52e9eef2aefd21aac6d2979b23
qemu-kvm-ma-2.12.0-18.el7_6.5.ppc64le.rpm SHA-256: b93cea2627ce620972ceb67ca295366dce405fb884ab9c078effd17a4cb52f71
qemu-kvm-ma-debuginfo-2.12.0-18.el7_6.5.ppc64le.rpm SHA-256: 35b0cb60aaf49457724b77e736025c4f68241dd7964899768f08014940e7df30
qemu-kvm-tools-ma-2.12.0-18.el7_6.5.ppc64le.rpm SHA-256: fb2460ecc99eb1aa9f1d370328064050ed4dde1736d4757e40526b97a60f3b67

Red Hat Enterprise Linux for ARM 64 7

SRPM
qemu-kvm-ma-2.12.0-18.el7_6.5.src.rpm SHA-256: f2c8365eb58b243e2b82e26edbfb1ffbb1a21c74c50ab4e68c5ca32a2775db23
aarch64
qemu-img-ma-2.12.0-18.el7_6.5.aarch64.rpm SHA-256: 91b88da7c3f27ec0e85522f072af46e342fc051935da66204dead975d3d5f8d3
qemu-kvm-common-ma-2.12.0-18.el7_6.5.aarch64.rpm SHA-256: a6712cf0fdb4efc656956578f75b72e4559fb94245e01a2e60ba32791f5ba010
qemu-kvm-ma-2.12.0-18.el7_6.5.aarch64.rpm SHA-256: 3e40b1fb0513d9f47449c73feab15d21a9b044f3933e3c915b0da96120e9a43e
qemu-kvm-ma-debuginfo-2.12.0-18.el7_6.5.aarch64.rpm SHA-256: e16344d00e254af279b17e179766c222c57f9fdcc7216ad26d2cd3459edfb4ef
qemu-kvm-tools-ma-2.12.0-18.el7_6.5.aarch64.rpm SHA-256: 1a013898cb8e9a81bb69c50ef18e394475201ad83371bf8a9e47ab0d6b888608

Red Hat Enterprise Linux for Power 9 7

SRPM
qemu-kvm-ma-2.12.0-18.el7_6.5.src.rpm SHA-256: f2c8365eb58b243e2b82e26edbfb1ffbb1a21c74c50ab4e68c5ca32a2775db23
ppc64le
qemu-img-ma-2.12.0-18.el7_6.5.ppc64le.rpm SHA-256: 286e2a740e3e132df930701103f5cf8a87d07d2484b7ce87744efc65d4134a8b
qemu-kvm-common-ma-2.12.0-18.el7_6.5.ppc64le.rpm SHA-256: 5c769fd96d76048a3d9edced767e075ae44c5b52e9eef2aefd21aac6d2979b23
qemu-kvm-ma-2.12.0-18.el7_6.5.ppc64le.rpm SHA-256: b93cea2627ce620972ceb67ca295366dce405fb884ab9c078effd17a4cb52f71
qemu-kvm-ma-debuginfo-2.12.0-18.el7_6.5.ppc64le.rpm SHA-256: 35b0cb60aaf49457724b77e736025c4f68241dd7964899768f08014940e7df30
qemu-kvm-tools-ma-2.12.0-18.el7_6.5.ppc64le.rpm SHA-256: fb2460ecc99eb1aa9f1d370328064050ed4dde1736d4757e40526b97a60f3b67

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.6

SRPM
qemu-kvm-ma-2.12.0-18.el7_6.5.src.rpm SHA-256: f2c8365eb58b243e2b82e26edbfb1ffbb1a21c74c50ab4e68c5ca32a2775db23
ppc64le
qemu-img-ma-2.12.0-18.el7_6.5.ppc64le.rpm SHA-256: 286e2a740e3e132df930701103f5cf8a87d07d2484b7ce87744efc65d4134a8b
qemu-kvm-common-ma-2.12.0-18.el7_6.5.ppc64le.rpm SHA-256: 5c769fd96d76048a3d9edced767e075ae44c5b52e9eef2aefd21aac6d2979b23
qemu-kvm-ma-2.12.0-18.el7_6.5.ppc64le.rpm SHA-256: b93cea2627ce620972ceb67ca295366dce405fb884ab9c078effd17a4cb52f71
qemu-kvm-ma-debuginfo-2.12.0-18.el7_6.5.ppc64le.rpm SHA-256: 35b0cb60aaf49457724b77e736025c4f68241dd7964899768f08014940e7df30
qemu-kvm-tools-ma-2.12.0-18.el7_6.5.ppc64le.rpm SHA-256: fb2460ecc99eb1aa9f1d370328064050ed4dde1736d4757e40526b97a60f3b67

Red Hat Enterprise Linux for IBM System z (Structure A) 7

SRPM
qemu-kvm-ma-2.12.0-18.el7_6.5.src.rpm SHA-256: f2c8365eb58b243e2b82e26edbfb1ffbb1a21c74c50ab4e68c5ca32a2775db23
s390x
qemu-img-ma-2.12.0-18.el7_6.5.s390x.rpm SHA-256: 2863f953d09031faa99dfe4ba29bfe7791d788bb7aaaf36fa6e02e591a30cb10
qemu-kvm-common-ma-2.12.0-18.el7_6.5.s390x.rpm SHA-256: 886e142c05be69eb5e008146470fa33863497ac8e0c029e92f23134fac0b489f
qemu-kvm-ma-2.12.0-18.el7_6.5.s390x.rpm SHA-256: 222fa85416a30d2d9b5628ae3833d4d44cddd4995b673dbd12d9c5316e562501
qemu-kvm-ma-debuginfo-2.12.0-18.el7_6.5.s390x.rpm SHA-256: 62dee34d803d746e9405d59ae336f663f2b256fd84ea39dcb4e5553069d8c454
qemu-kvm-tools-ma-2.12.0-18.el7_6.5.s390x.rpm SHA-256: 0753caf9c72747b3d8829d06104b474d65bfc0944345aa12ae12c5e6cf02de88

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility