Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2020:2104 - Security Advisory
Issued:
2020-05-12
Updated:
2020-05-12

RHSA-2020:2104 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel-alt security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel-alt is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel-alt packages provide the Linux kernel version 4.x.

Security Fix(es):

  • kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c (CVE-2017-18595)
  • kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768)
  • Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711)
  • kernel: out of bounds write in function i2c_smbus_xfer_emulated in drivers/i2c/i2c-core-smbus.c (CVE-2017-18551)
  • kernel: out of bounds write in i2c driver leads to local escalation of privilege (CVE-2019-9454)
  • kernel: denial of service in in xfs_setattr_nonsize in fs/xfs/xfs_iops.c (CVE-2019-15538)
  • kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c (CVE-2019-19447)
  • kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free (CVE-2019-19524)
  • kernel: out-of-bounds read in set_fdc in drivers/block/floppy.c (CVE-2020-9383)
  • kernel: null pointer dereference in dlpar_parse_cc_property in arch/powerrc/platforms/pseries/dlpar.c causing denial of service (CVE-2019-12614)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • [7.5-alt][ext4/xfstests generic/468] fix fdatasync(2) after fallocate(2) operation (upstream fixed) [rhel-alt-7.6.z] (BZ#1554273)
  • [RHEL-ALT-7.6.z][arm64] CN99xx: DIMM errors not populated in EDAC sysfs (BZ#1778697)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for ARM 64 7 aarch64
  • Red Hat Enterprise Linux for Power 9 7 ppc64le
  • Red Hat Enterprise Linux for IBM System z (Structure A) 7 s390x

Fixes

  • BZ - 1718176 - CVE-2019-12614 kernel: null pointer dereference in dlpar_parse_cc_property in arch/powerrc/platforms/pseries/dlpar.c causing denial of service
  • BZ - 1746777 - CVE-2019-15538 kernel: denial of service in in xfs_setattr_nonsize in fs/xfs/xfs_iops.c
  • BZ - 1757368 - CVE-2017-18551 kernel: out of bounds write in function i2c_smbus_xfer_emulated in drivers/i2c/i2c-core-smbus.c
  • BZ - 1758671 - CVE-2017-18595 kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c
  • BZ - 1781679 - CVE-2019-19447 kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c
  • BZ - 1783459 - CVE-2019-19524 kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free
  • BZ - 1786164 - CVE-2019-19768 kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c
  • BZ - 1810685 - CVE-2020-9383 kernel: out-of-bounds read in set_fdc in drivers/block/floppy.c
  • BZ - 1818818 - CVE-2019-9454 kernel: out of bounds write in i2c driver leads to local escalation of privilege
  • BZ - 1825116 - CVE-2020-10711 Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic

CVEs

  • CVE-2017-18551
  • CVE-2017-18595
  • CVE-2019-9454
  • CVE-2019-12614
  • CVE-2019-15538
  • CVE-2019-19447
  • CVE-2019-19524
  • CVE-2019-19768
  • CVE-2020-9383
  • CVE-2020-10711

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for ARM 64 7

SRPM
kernel-alt-4.14.0-115.21.2.el7a.src.rpm SHA-256: 9a4ec39d684c7fdaa6d2963b31de6c094f1af37a17c9254653fd459237db47f2
aarch64
kernel-4.14.0-115.21.2.el7a.aarch64.rpm SHA-256: d6fa828ecac5a66b96d0210f8b02eaeef270be73ca89d826cf515ef7135844d3
kernel-abi-whitelists-4.14.0-115.21.2.el7a.noarch.rpm SHA-256: fc0fe6f05106946f381644f7024bed01f46d03e92344458fcfe97bbbcb5e4b43
kernel-debug-4.14.0-115.21.2.el7a.aarch64.rpm SHA-256: 3175352555136580d3b0b0c30a82a876adf88755f9f00c6729422eaa90c91eb7
kernel-debug-debuginfo-4.14.0-115.21.2.el7a.aarch64.rpm SHA-256: 7ef4e925145b3823576d97c4bfa5e7effbd45079d5cf183ed1126b648487169a
kernel-debug-debuginfo-4.14.0-115.21.2.el7a.aarch64.rpm SHA-256: 7ef4e925145b3823576d97c4bfa5e7effbd45079d5cf183ed1126b648487169a
kernel-debug-devel-4.14.0-115.21.2.el7a.aarch64.rpm SHA-256: db6e6dc0d935752722a4831e1e75939d54e45e0e52a6b1d1f533b9f941629bc1
kernel-debuginfo-4.14.0-115.21.2.el7a.aarch64.rpm SHA-256: db8d5315b7f7c20d49d908749dcf83db1e9b9256ca98936e9a8e7b5b9eb0a975
kernel-debuginfo-4.14.0-115.21.2.el7a.aarch64.rpm SHA-256: db8d5315b7f7c20d49d908749dcf83db1e9b9256ca98936e9a8e7b5b9eb0a975
kernel-debuginfo-common-aarch64-4.14.0-115.21.2.el7a.aarch64.rpm SHA-256: 07ac5dfe1922d713d8bdfeb4d338812783310b86ce878d95a419c246344f31b1
kernel-debuginfo-common-aarch64-4.14.0-115.21.2.el7a.aarch64.rpm SHA-256: 07ac5dfe1922d713d8bdfeb4d338812783310b86ce878d95a419c246344f31b1
kernel-devel-4.14.0-115.21.2.el7a.aarch64.rpm SHA-256: 46656e4d60aa30951be2aa5ce6efc0109eb682f0e0d5b39bbf0cea4597215e3f
kernel-doc-4.14.0-115.21.2.el7a.noarch.rpm SHA-256: 1ab0e12cc59e8ad5aa719d68e6f1e8e3404387548482e2fe1d02752444d56b2a
kernel-doc-4.14.0-115.21.2.el7a.noarch.rpm SHA-256: 1ab0e12cc59e8ad5aa719d68e6f1e8e3404387548482e2fe1d02752444d56b2a
kernel-headers-4.14.0-115.21.2.el7a.aarch64.rpm SHA-256: 836475de77080645846362c018cce3e3c38d2e8120a9b24741bb15489d8d953f
kernel-tools-4.14.0-115.21.2.el7a.aarch64.rpm SHA-256: 9da961101c9abd36765bbdf0c1c360a9a04a292bc0562e8f0b48eccf5e656fb4
kernel-tools-debuginfo-4.14.0-115.21.2.el7a.aarch64.rpm SHA-256: 13202f1d5abdd68901d5672feab67c0f748b211b5198766388704266bd0d0b8d
kernel-tools-debuginfo-4.14.0-115.21.2.el7a.aarch64.rpm SHA-256: 13202f1d5abdd68901d5672feab67c0f748b211b5198766388704266bd0d0b8d
kernel-tools-libs-4.14.0-115.21.2.el7a.aarch64.rpm SHA-256: 8053a6dc98a1e899dffc3a2e507aef8090683d76100b1a91356941fbc34fcf52
kernel-tools-libs-devel-4.14.0-115.21.2.el7a.aarch64.rpm SHA-256: eeb812a736adbfbab1d7a9a3dcd3ea195d934f9599ce91e732b75c932bbcef7f
perf-4.14.0-115.21.2.el7a.aarch64.rpm SHA-256: 154e5e1711b11783ed706c56757713211301b7946590c4b9b223e6567be736c0
perf-debuginfo-4.14.0-115.21.2.el7a.aarch64.rpm SHA-256: 48628a36569df236febc7ab26c36d7b71b4ebe9a29fcd8243638002e054fa7dd
perf-debuginfo-4.14.0-115.21.2.el7a.aarch64.rpm SHA-256: 48628a36569df236febc7ab26c36d7b71b4ebe9a29fcd8243638002e054fa7dd
python-perf-4.14.0-115.21.2.el7a.aarch64.rpm SHA-256: aed394a8af630711790f3c80368214f22d3aa728936e9bcd38f2d8128c290383
python-perf-debuginfo-4.14.0-115.21.2.el7a.aarch64.rpm SHA-256: 67dbb96cedb9f8116170549d269940db305989dfccef2ae323bf67de57739e79
python-perf-debuginfo-4.14.0-115.21.2.el7a.aarch64.rpm SHA-256: 67dbb96cedb9f8116170549d269940db305989dfccef2ae323bf67de57739e79

Red Hat Enterprise Linux for Power 9 7

SRPM
kernel-alt-4.14.0-115.21.2.el7a.src.rpm SHA-256: 9a4ec39d684c7fdaa6d2963b31de6c094f1af37a17c9254653fd459237db47f2
ppc64le
kernel-4.14.0-115.21.2.el7a.ppc64le.rpm SHA-256: 50c4ee49b3e1458a25a3b339bf03ac75e0e38b9289760426208bbfe6931831a7
kernel-abi-whitelists-4.14.0-115.21.2.el7a.noarch.rpm SHA-256: fc0fe6f05106946f381644f7024bed01f46d03e92344458fcfe97bbbcb5e4b43
kernel-bootwrapper-4.14.0-115.21.2.el7a.ppc64le.rpm SHA-256: e8881a3fc1923c4989b84dc02237782227820a8a99b4d2d014595a4efc009802
kernel-debug-4.14.0-115.21.2.el7a.ppc64le.rpm SHA-256: 7e87b557177ace481b37bd8a0bd193505f66cdb33de118fd59f1c8cd237d0a44
kernel-debug-debuginfo-4.14.0-115.21.2.el7a.ppc64le.rpm SHA-256: 5df8924d150a261a33de2219c38f3cc9c69dfe2ae6fd28692c83228c05676956
kernel-debug-debuginfo-4.14.0-115.21.2.el7a.ppc64le.rpm SHA-256: 5df8924d150a261a33de2219c38f3cc9c69dfe2ae6fd28692c83228c05676956
kernel-debug-devel-4.14.0-115.21.2.el7a.ppc64le.rpm SHA-256: 0017bd7c30f477012f0327ccab27935c853cf806050be057cec07fbb003927c5
kernel-debuginfo-4.14.0-115.21.2.el7a.ppc64le.rpm SHA-256: 35b05a6390ddc6df51804c3e7d7bb55a51a7beb1db2cd26a5ac40f7072c2b0c5
kernel-debuginfo-4.14.0-115.21.2.el7a.ppc64le.rpm SHA-256: 35b05a6390ddc6df51804c3e7d7bb55a51a7beb1db2cd26a5ac40f7072c2b0c5
kernel-debuginfo-common-ppc64le-4.14.0-115.21.2.el7a.ppc64le.rpm SHA-256: 245ca5c079f268152fa4b4c644bbb8a57cf8498843ba092e864e91c833fe97b2
kernel-debuginfo-common-ppc64le-4.14.0-115.21.2.el7a.ppc64le.rpm SHA-256: 245ca5c079f268152fa4b4c644bbb8a57cf8498843ba092e864e91c833fe97b2
kernel-devel-4.14.0-115.21.2.el7a.ppc64le.rpm SHA-256: 30b983712549605c6edc950ac3ae1a85ee005c2db03a8abcd428bfc70f07ce37
kernel-doc-4.14.0-115.21.2.el7a.noarch.rpm SHA-256: 1ab0e12cc59e8ad5aa719d68e6f1e8e3404387548482e2fe1d02752444d56b2a
kernel-headers-4.14.0-115.21.2.el7a.ppc64le.rpm SHA-256: 07f75d043c3794f099f2c569fffbe08997632d415e9ff4f9fa13290c98468bca
kernel-tools-4.14.0-115.21.2.el7a.ppc64le.rpm SHA-256: be0a5c259664e3c24709bd43d11e0442a635a766daf50da6acc4347b8bdf62e9
kernel-tools-debuginfo-4.14.0-115.21.2.el7a.ppc64le.rpm SHA-256: b402b4fa1394e83be37c9e97d5e964681049ddbaee96e76dcfe4719897c9000b
kernel-tools-debuginfo-4.14.0-115.21.2.el7a.ppc64le.rpm SHA-256: b402b4fa1394e83be37c9e97d5e964681049ddbaee96e76dcfe4719897c9000b
kernel-tools-libs-4.14.0-115.21.2.el7a.ppc64le.rpm SHA-256: 1a39270532534a3a196ea9b87b6f420b740325d0d6b717aa31f2218d8da356bc
kernel-tools-libs-devel-4.14.0-115.21.2.el7a.ppc64le.rpm SHA-256: f64ce1a6fcaec4467a827688044a9aaaab3092835e597104c96ada1a8d74001a
perf-4.14.0-115.21.2.el7a.ppc64le.rpm SHA-256: 4d9af1e9099856de5b08e3577e71b9c75b0c5e5ce8d360dbe475af1fb7e74e1a
perf-debuginfo-4.14.0-115.21.2.el7a.ppc64le.rpm SHA-256: 8bf956dd8d06ad82b857c31730dce3d696940fa3ae46ef4ca3f6421610602cd4
perf-debuginfo-4.14.0-115.21.2.el7a.ppc64le.rpm SHA-256: 8bf956dd8d06ad82b857c31730dce3d696940fa3ae46ef4ca3f6421610602cd4
python-perf-4.14.0-115.21.2.el7a.ppc64le.rpm SHA-256: 426eba04e3f9debccc0371cb5faaba9cf75822134adaeb29dfe49181f9089480
python-perf-debuginfo-4.14.0-115.21.2.el7a.ppc64le.rpm SHA-256: 09b1dbead076ba9a8d996a22d5ff62f5cbc8c8211cbdecb2bb9b7427adcc068d
python-perf-debuginfo-4.14.0-115.21.2.el7a.ppc64le.rpm SHA-256: 09b1dbead076ba9a8d996a22d5ff62f5cbc8c8211cbdecb2bb9b7427adcc068d

Red Hat Enterprise Linux for IBM System z (Structure A) 7

SRPM
kernel-alt-4.14.0-115.21.2.el7a.src.rpm SHA-256: 9a4ec39d684c7fdaa6d2963b31de6c094f1af37a17c9254653fd459237db47f2
s390x
kernel-4.14.0-115.21.2.el7a.s390x.rpm SHA-256: 4ae992718af636a2e2dab8c5b39ecf976332dac841e77be03f87677cabe29b49
kernel-abi-whitelists-4.14.0-115.21.2.el7a.noarch.rpm SHA-256: fc0fe6f05106946f381644f7024bed01f46d03e92344458fcfe97bbbcb5e4b43
kernel-debug-4.14.0-115.21.2.el7a.s390x.rpm SHA-256: 3320ea1135e464921f5ac4da7286796eaa3ce192df3ffd712903ce7409104e43
kernel-debug-debuginfo-4.14.0-115.21.2.el7a.s390x.rpm SHA-256: 1d061cd4f62dc6037d615f11321867fceef3107a7cdecc4ccbbc54b2071b928e
kernel-debug-devel-4.14.0-115.21.2.el7a.s390x.rpm SHA-256: 8acd5873becb340c4f9baa8a5f118f5ac68432ef146218ed2eaeb79911c6a51f
kernel-debuginfo-4.14.0-115.21.2.el7a.s390x.rpm SHA-256: ab3d3168f85b6e8ca85045c5cf1acf8e5be2ea22a223b7467b82ec9a12ee4225
kernel-debuginfo-common-s390x-4.14.0-115.21.2.el7a.s390x.rpm SHA-256: 86ba90efca9b101d4a57086c7914a9dd636c8fe238bdca7eab17d8ab81b6f315
kernel-devel-4.14.0-115.21.2.el7a.s390x.rpm SHA-256: 3b67729b3f34138751d34c57c154a325183aea52107e50b48df4e12a6f8ceb5b
kernel-doc-4.14.0-115.21.2.el7a.noarch.rpm SHA-256: 1ab0e12cc59e8ad5aa719d68e6f1e8e3404387548482e2fe1d02752444d56b2a
kernel-headers-4.14.0-115.21.2.el7a.s390x.rpm SHA-256: 945372b1a92c77e2cb1f0cdd204f30cd4ee52c17fec85ed9416fba670dfb59d6
kernel-kdump-4.14.0-115.21.2.el7a.s390x.rpm SHA-256: 4f9d00e6d588d57b052c9e87cdd5f8249335e650af66212ca8d8cf2c0803fc2a
kernel-kdump-debuginfo-4.14.0-115.21.2.el7a.s390x.rpm SHA-256: e4b158f08e1bae9a4431371dc66d068e42b1042f53da7492597a627b33816bf0
kernel-kdump-devel-4.14.0-115.21.2.el7a.s390x.rpm SHA-256: 8c0075b2bdf8be533ed00200d965eb72583acf9dd5db4efc8fc89a40273b9a1a
perf-4.14.0-115.21.2.el7a.s390x.rpm SHA-256: 174b26e6675d5c5a776664cfba10fb80793a12e1387c67e179d131ef8a4a7217
perf-debuginfo-4.14.0-115.21.2.el7a.s390x.rpm SHA-256: be62a54959f9413ae22fab9267bf2593ac9a57979ac6d00f9eddb762fe89b1a0
python-perf-4.14.0-115.21.2.el7a.s390x.rpm SHA-256: 1b19650b8df90cda456ef8984f8f5b6f48f01a4c62d5b10f6e3460dcc8e024bd
python-perf-debuginfo-4.14.0-115.21.2.el7a.s390x.rpm SHA-256: cacffdee810e407912e92229d618fd971b1287bf2f9f28690cb7336e3e8be67e

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat X (formerly Twitter)

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility