Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2020:4047 - Security Advisory
Issued:
2020-09-29
Updated:
2020-09-29

RHSA-2020:4047 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: qemu-kvm-ma security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for qemu-kvm-ma is now available for Red Hat Enterprise Linux 7.7 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures.

Security Fix(es):

  • QEMU: usb: out-of-bounds r/w access issue while processing usb packets (CVE-2020-14364)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.7 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.7 ppc64
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.7 ppc64le
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7 ppc64le

Fixes

  • BZ - 1869201 - CVE-2020-14364 QEMU: usb: out-of-bounds r/w access issue while processing usb packets

CVEs

  • CVE-2020-14364

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://bugzilla.redhat.com/show_bug.cgi?id=1869705
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.7

SRPM
qemu-kvm-ma-2.12.0-33.el7_7.4.src.rpm SHA-256: eb6bb40fa1028827970b83696881f04d51f141aff836dbfcf89269941a4916a1
s390x
qemu-img-ma-2.12.0-33.el7_7.4.s390x.rpm SHA-256: dfc01d7054513bddee520d1859a7412e49781fec467f635d8779febb7d216993
qemu-kvm-common-ma-2.12.0-33.el7_7.4.s390x.rpm SHA-256: d9065f26b1a9a0cfba0e223d640c02b8418c9ae5df404fb68dc949c704e1a4f2
qemu-kvm-ma-2.12.0-33.el7_7.4.s390x.rpm SHA-256: 04faf474a470507d5928f1f4cd8b3e92e1bc0e539b68ddf65b12506e6659dc96
qemu-kvm-ma-debuginfo-2.12.0-33.el7_7.4.s390x.rpm SHA-256: 0f6da150a256d3e362714b3928a2ef77a5518f34d9501747194b55d87d27858b
qemu-kvm-tools-ma-2.12.0-33.el7_7.4.s390x.rpm SHA-256: f2de03b9f67edb61ab78d10c861c2a9191187537930ad1cc2eeb6ee973b5c317

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.7

SRPM
qemu-kvm-ma-2.12.0-33.el7_7.4.src.rpm SHA-256: eb6bb40fa1028827970b83696881f04d51f141aff836dbfcf89269941a4916a1
ppc64
qemu-img-ma-2.12.0-33.el7_7.4.ppc64.rpm SHA-256: 6d5a33ab81e422e6fedc0708028ac13151f4a347340831a80aa907224f28defd
qemu-kvm-common-ma-2.12.0-33.el7_7.4.ppc64.rpm SHA-256: a212861a35363151d5407352e64bfa0c2534fff1e12865efb982ef184f4cf78e
qemu-kvm-ma-2.12.0-33.el7_7.4.ppc64.rpm SHA-256: 00103f210ba329bebe2c2a213005a24706d8d4f46994fec3199acb0cb43c5516
qemu-kvm-ma-debuginfo-2.12.0-33.el7_7.4.ppc64.rpm SHA-256: cc4163ea7af3535b75bd739512b39a172398413ec2054daf04d1879b92da8aac
qemu-kvm-ma-debuginfo-2.12.0-33.el7_7.4.ppc64.rpm SHA-256: cc4163ea7af3535b75bd739512b39a172398413ec2054daf04d1879b92da8aac
qemu-kvm-tools-ma-2.12.0-33.el7_7.4.ppc64.rpm SHA-256: c1d6839fd5da6092400563d34b8c866dd3696371052c8eb358da780bd0c7cdee

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.7

SRPM
qemu-kvm-ma-2.12.0-33.el7_7.4.src.rpm SHA-256: eb6bb40fa1028827970b83696881f04d51f141aff836dbfcf89269941a4916a1
ppc64le
qemu-img-ma-2.12.0-33.el7_7.4.ppc64le.rpm SHA-256: 025f85590c93a6f1ca423609db740d903a534212dd0b07573b5668b26cec89a9
qemu-kvm-common-ma-2.12.0-33.el7_7.4.ppc64le.rpm SHA-256: a7707cd1fbf66d3eb1a13a5a81c3e392cb490b07555edca43097fddba62ee16c
qemu-kvm-ma-2.12.0-33.el7_7.4.ppc64le.rpm SHA-256: 9e9ae27f6c2a68df4005a63c921c4f8f58b6c4fff38245276dd5dbc099620155
qemu-kvm-ma-debuginfo-2.12.0-33.el7_7.4.ppc64le.rpm SHA-256: 5ce64ed0ba16baecdf4215c9395664cd4c218d9d76171d726f16ae7d28fe9cf4
qemu-kvm-tools-ma-2.12.0-33.el7_7.4.ppc64le.rpm SHA-256: c2e607741982ce51ce6d8fa851a6d2e5479e54de40f3ed5944a35358df5d441a

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7

SRPM
qemu-kvm-ma-2.12.0-33.el7_7.4.src.rpm SHA-256: eb6bb40fa1028827970b83696881f04d51f141aff836dbfcf89269941a4916a1
ppc64le
qemu-img-ma-2.12.0-33.el7_7.4.ppc64le.rpm SHA-256: 025f85590c93a6f1ca423609db740d903a534212dd0b07573b5668b26cec89a9
qemu-kvm-common-ma-2.12.0-33.el7_7.4.ppc64le.rpm SHA-256: a7707cd1fbf66d3eb1a13a5a81c3e392cb490b07555edca43097fddba62ee16c
qemu-kvm-ma-2.12.0-33.el7_7.4.ppc64le.rpm SHA-256: 9e9ae27f6c2a68df4005a63c921c4f8f58b6c4fff38245276dd5dbc099620155
qemu-kvm-ma-debuginfo-2.12.0-33.el7_7.4.ppc64le.rpm SHA-256: 5ce64ed0ba16baecdf4215c9395664cd4c218d9d76171d726f16ae7d28fe9cf4
qemu-kvm-tools-ma-2.12.0-33.el7_7.4.ppc64le.rpm SHA-256: c2e607741982ce51ce6d8fa851a6d2e5479e54de40f3ed5944a35358df5d441a

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility