First published: Tue May 12 2020(Updated: )
The kernel-alt packages provide the Linux kernel version 4.x.<br>Security Fix(es):<br><li> kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c (CVE-2017-18595)</li> <li> kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768)</li> <li> Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711)</li> <li> kernel: out of bounds write in function i2c_smbus_xfer_emulated in drivers/i2c/i2c-core-smbus.c (CVE-2017-18551)</li> <li> kernel: out of bounds write in i2c driver leads to local escalation of privilege (CVE-2019-9454)</li> <li> kernel: denial of service in in xfs_setattr_nonsize in fs/xfs/xfs_iops.c (CVE-2019-15538)</li> <li> kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c (CVE-2019-19447)</li> <li> kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free (CVE-2019-19524)</li> <li> kernel: out-of-bounds read in set_fdc in drivers/block/floppy.c (CVE-2020-9383)</li> <li> kernel: null pointer dereference in dlpar_parse_cc_property in arch/powerrc/platforms/pseries/dlpar.c causing denial of service (CVE-2019-12614)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Bug Fix(es):<br><li> [7.5-alt][ext4/xfstests generic/468] fix fdatasync(2) after fallocate(2) operation (upstream fixed) [rhel-alt-7.6.z] (BZ#1554273)</li> <li> [RHEL-ALT-7.6.z][arm64] CN99xx: DIMM errors not populated in EDAC sysfs (BZ#1778697)</li>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-alt | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/kernel | <4.14.0-115.21.2.el7a.aa | 4.14.0-115.21.2.el7a.aa |
redhat/kernel-abi-whitelists | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/kernel-debug | <4.14.0-115.21.2.el7a.aa | 4.14.0-115.21.2.el7a.aa |
redhat/kernel-debug-debuginfo | <4.14.0-115.21.2.el7a.aa | 4.14.0-115.21.2.el7a.aa |
redhat/kernel-debug-devel | <4.14.0-115.21.2.el7a.aa | 4.14.0-115.21.2.el7a.aa |
redhat/kernel-debuginfo | <4.14.0-115.21.2.el7a.aa | 4.14.0-115.21.2.el7a.aa |
redhat/kernel-debuginfo-common-aarch64 | <4.14.0-115.21.2.el7a.aa | 4.14.0-115.21.2.el7a.aa |
redhat/kernel-devel | <4.14.0-115.21.2.el7a.aa | 4.14.0-115.21.2.el7a.aa |
redhat/kernel-doc | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/kernel-headers | <4.14.0-115.21.2.el7a.aa | 4.14.0-115.21.2.el7a.aa |
redhat/kernel-tools | <4.14.0-115.21.2.el7a.aa | 4.14.0-115.21.2.el7a.aa |
redhat/kernel-tools-debuginfo | <4.14.0-115.21.2.el7a.aa | 4.14.0-115.21.2.el7a.aa |
redhat/kernel-tools-libs | <4.14.0-115.21.2.el7a.aa | 4.14.0-115.21.2.el7a.aa |
redhat/kernel-tools-libs-devel | <4.14.0-115.21.2.el7a.aa | 4.14.0-115.21.2.el7a.aa |
redhat/perf | <4.14.0-115.21.2.el7a.aa | 4.14.0-115.21.2.el7a.aa |
redhat/perf-debuginfo | <4.14.0-115.21.2.el7a.aa | 4.14.0-115.21.2.el7a.aa |
redhat/python-perf | <4.14.0-115.21.2.el7a.aa | 4.14.0-115.21.2.el7a.aa |
redhat/python-perf-debuginfo | <4.14.0-115.21.2.el7a.aa | 4.14.0-115.21.2.el7a.aa |
redhat/kernel | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/kernel-bootwrapper | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/kernel-debug | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/kernel-debug-debuginfo | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/kernel-debug-devel | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/kernel-debuginfo | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/kernel-debuginfo-common-ppc64le | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/kernel-devel | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/kernel-headers | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/kernel-tools | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/kernel-tools-debuginfo | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/kernel-tools-libs | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/kernel-tools-libs-devel | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/perf | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/perf-debuginfo | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/python-perf | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/python-perf-debuginfo | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/kernel | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/kernel-debug | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/kernel-debug-debuginfo | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/kernel-debug-devel | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/kernel-debuginfo | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/kernel-debuginfo-common-s390x | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/kernel-devel | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/kernel-headers | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/kernel-kdump | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/kernel-kdump-debuginfo | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/kernel-kdump-devel | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/perf | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/perf-debuginfo | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/python-perf | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
redhat/python-perf-debuginfo | <4.14.0-115.21.2.el7a | 4.14.0-115.21.2.el7a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity rating of RHSA-2020:2104 is determined to be moderate due to vulnerabilities that could lead to memory corruption issues.
To resolve RHSA-2020:2104, you should upgrade to the latest kernel-alt package version 4.14.0-115.21.2.el7a.
RHSA-2020:2104 addresses a double free vulnerability and a use-after-free vulnerability in the Linux kernel.
The affected packages include kernel-alt, kernel, and kernel-debug among others within the specified version range.
Failing to apply the patch for RHSA-2020:2104 may expose your system to potential security risks such as memory corruption and instability.