First published: Tue Nov 10 2020(Updated: )
The kernel-alt packages provide the Linux kernel version 4.x.<br>Security Fix(es):<br><li> kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS (CVE-2020-25641)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Bug Fix(es):<br><li> RHEL-Alt-7.6 - kernel "Oops: Kernel access of bad area" in crypto_unregister_instance while running LTP testcase crypto_user02 (BZ#1882230)</li>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-alt | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/kernel | <4.14.0-115.33.1.el7a.aa | 4.14.0-115.33.1.el7a.aa |
redhat/kernel-abi-whitelists | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/kernel-debug | <4.14.0-115.33.1.el7a.aa | 4.14.0-115.33.1.el7a.aa |
redhat/kernel-debug-debuginfo | <4.14.0-115.33.1.el7a.aa | 4.14.0-115.33.1.el7a.aa |
redhat/kernel-debug-devel | <4.14.0-115.33.1.el7a.aa | 4.14.0-115.33.1.el7a.aa |
redhat/kernel-debuginfo | <4.14.0-115.33.1.el7a.aa | 4.14.0-115.33.1.el7a.aa |
redhat/kernel-debuginfo-common-aarch64 | <4.14.0-115.33.1.el7a.aa | 4.14.0-115.33.1.el7a.aa |
redhat/kernel-devel | <4.14.0-115.33.1.el7a.aa | 4.14.0-115.33.1.el7a.aa |
redhat/kernel-doc | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/kernel-headers | <4.14.0-115.33.1.el7a.aa | 4.14.0-115.33.1.el7a.aa |
redhat/kernel-tools | <4.14.0-115.33.1.el7a.aa | 4.14.0-115.33.1.el7a.aa |
redhat/kernel-tools-debuginfo | <4.14.0-115.33.1.el7a.aa | 4.14.0-115.33.1.el7a.aa |
redhat/kernel-tools-libs | <4.14.0-115.33.1.el7a.aa | 4.14.0-115.33.1.el7a.aa |
redhat/kernel-tools-libs-devel | <4.14.0-115.33.1.el7a.aa | 4.14.0-115.33.1.el7a.aa |
redhat/perf | <4.14.0-115.33.1.el7a.aa | 4.14.0-115.33.1.el7a.aa |
redhat/perf-debuginfo | <4.14.0-115.33.1.el7a.aa | 4.14.0-115.33.1.el7a.aa |
redhat/python-perf | <4.14.0-115.33.1.el7a.aa | 4.14.0-115.33.1.el7a.aa |
redhat/python-perf-debuginfo | <4.14.0-115.33.1.el7a.aa | 4.14.0-115.33.1.el7a.aa |
redhat/kernel | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/kernel-bootwrapper | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/kernel-debug | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/kernel-debug-debuginfo | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/kernel-debug-devel | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/kernel-debuginfo | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/kernel-debuginfo-common-ppc64le | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/kernel-devel | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/kernel-headers | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/kernel-tools | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/kernel-tools-debuginfo | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/kernel-tools-libs | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/kernel-tools-libs-devel | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/perf | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/perf-debuginfo | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/python-perf | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/python-perf-debuginfo | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/kernel | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/kernel-debug | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/kernel-debug-debuginfo | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/kernel-debug-devel | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/kernel-debuginfo | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/kernel-debuginfo-common-s390x | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/kernel-devel | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/kernel-headers | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/kernel-kdump | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/kernel-kdump-debuginfo | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/kernel-kdump-devel | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/perf | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/perf-debuginfo | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/python-perf | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
redhat/python-perf-debuginfo | <4.14.0-115.33.1.el7a | 4.14.0-115.33.1.el7a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2020:5079 is considered critical due to the potential for denial-of-service attacks.
You can fix RHSA-2020:5079 by updating the affected kernel-alt packages to version 4.14.0-115.33.1.el7a.
RHSA-2020:5079 addresses a vulnerability that can cause soft-lockups in iov_iter_copy_from_user_atomic(), leading to a denial of service.
RHSA-2020:5079 affects users of kernel-alt packages running versions prior to 4.14.0-115.33.1.el7a.
Systems running the Linux kernel version 4.x with the affected kernel-alt packages are impacted by RHSA-2020:5079.