First published: Tue Feb 02 2021(Updated: )
The kernel-alt packages provide the Linux kernel version 4.x.<br>Security Fix(es):<br><li> kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free (CVE-2020-29661)</li> <li> kernel: some ipv6 protocols not encrypted over ipsec tunnel (CVE-2020-1749)</li> <li> kernel: use-after-free in fs/block_dev.c (CVE-2020-15436)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-alt | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/kernel | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/kernel-abi-whitelists | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/kernel-bootwrapper | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/kernel-debug | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/kernel-debug-debuginfo | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/kernel-debug-devel | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/kernel-debuginfo | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/kernel-debuginfo-common-ppc64le | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/kernel-devel | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/kernel-doc | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/kernel-headers | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/kernel-tools | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/kernel-tools-debuginfo | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/kernel-tools-libs | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/kernel-tools-libs-devel | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/perf | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/perf-debuginfo | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/python-perf | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/python-perf-debuginfo | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/kernel | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/kernel-debug | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/kernel-debug-debuginfo | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/kernel-debug-devel | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/kernel-debuginfo | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/kernel-debuginfo-common-s390x | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/kernel-devel | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/kernel-headers | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/kernel-kdump | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/kernel-kdump-debuginfo | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/kernel-kdump-devel | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/perf | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/perf-debuginfo | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/python-perf | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
redhat/python-perf-debuginfo | <4.14.0-115.35.1.el7a | 4.14.0-115.35.1.el7a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2021:0354 is classified as important due to various vulnerabilities including a use-after-free issue and IPv6 encryption flaws.
To fix RHSA-2021:0354, you should update the kernel and related packages to version 4.14.0-115.35.1.el7a or later.
RHSA-2021:0354 addresses multiple vulnerabilities including CVE-2020-29661 and CVE-2020-1749 related to the Linux kernel.
Packages affected by RHSA-2021:0354 include kernel-alt, kernel, kernel-debug, and several related kernel packages.
Currently, the best approach for handling RHSA-2021:0354 is to apply the available updates rather than relying on workarounds.