Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2020:3545 - Security Advisory
Issued:
2020-08-25
Updated:
2020-08-25

RHSA-2020:3545 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel-alt security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel-alt is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel-alt packages provide the Linux kernel version 4.x.

Security Fix(es):

  • kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c (CVE-2019-19046)
  • kernel: Buffer over-read in crypto_authenc_extractkeys() when a payload longer than 4 bytes is not aligned. (CVE-2020-10769)
  • kernel: sync of excessive duration via an XFS v5 image with crafted metadata (CVE-2020-12655)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • list corruption in iscsi_queuecommand (BZ#1839622)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for ARM 64 7 aarch64
  • Red Hat Enterprise Linux for Power 9 7 ppc64le
  • Red Hat Enterprise Linux for IBM System z (Structure A) 7 s390x

Fixes

  • BZ - 1708775 - CVE-2020-10769 kernel: Buffer over-read in crypto_authenc_extractkeys() when a payload longer than 4 bytes is not aligned.
  • BZ - 1774988 - CVE-2019-19046 kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c
  • BZ - 1832543 - CVE-2020-12655 kernel: sync of excessive duration via an XFS v5 image with crafted metadata

CVEs

  • CVE-2019-19046
  • CVE-2020-10769
  • CVE-2020-12655

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for ARM 64 7

SRPM
kernel-alt-4.14.0-115.29.1.el7a.src.rpm SHA-256: c29e86263698e14f141c81cc6115a5bbebb4d14f151adb5c8f72944074295b2a
aarch64
kernel-4.14.0-115.29.1.el7a.aarch64.rpm SHA-256: 3487554dd43ab6ba5ba747f8a57d67f3221c3b53ff1e70d0c1fb33898bfb9b66
kernel-abi-whitelists-4.14.0-115.29.1.el7a.noarch.rpm SHA-256: d5af77ba3d86d8b4eaa7bd6719f451df7326766d6026855c1303f1a6df226490
kernel-debug-4.14.0-115.29.1.el7a.aarch64.rpm SHA-256: 4d1875f1db5989e398dfe48a6d5d66c7cf08eea6659b77e28765d4871906d2b2
kernel-debug-debuginfo-4.14.0-115.29.1.el7a.aarch64.rpm SHA-256: 8f8e2a92720e8729e09112e03ae8c4f61ed0d454ec2c87ef0d27ed3ca9b11115
kernel-debug-debuginfo-4.14.0-115.29.1.el7a.aarch64.rpm SHA-256: 8f8e2a92720e8729e09112e03ae8c4f61ed0d454ec2c87ef0d27ed3ca9b11115
kernel-debug-devel-4.14.0-115.29.1.el7a.aarch64.rpm SHA-256: c9fad3f1c21a656e2853795c8e1fd986fd1d09df236e4685cd94dca5aa085dbf
kernel-debuginfo-4.14.0-115.29.1.el7a.aarch64.rpm SHA-256: 2210daba417ac5814f5e5a591dab3689a8b139830df021f1632ad7352f8d0d59
kernel-debuginfo-4.14.0-115.29.1.el7a.aarch64.rpm SHA-256: 2210daba417ac5814f5e5a591dab3689a8b139830df021f1632ad7352f8d0d59
kernel-debuginfo-common-aarch64-4.14.0-115.29.1.el7a.aarch64.rpm SHA-256: 1ef1d22ee416a216416f679ddeacebd1b8b343449f92ce07ad422d607217d820
kernel-debuginfo-common-aarch64-4.14.0-115.29.1.el7a.aarch64.rpm SHA-256: 1ef1d22ee416a216416f679ddeacebd1b8b343449f92ce07ad422d607217d820
kernel-devel-4.14.0-115.29.1.el7a.aarch64.rpm SHA-256: 6a42e201c3d56186527ead731f90f40bd9633185c77dfad9b0043a620466f3bf
kernel-doc-4.14.0-115.29.1.el7a.noarch.rpm SHA-256: b26b6ba440bfe477f3e9f19e4bbccb81a4a6d741bad933398862bb8327cdf0ea
kernel-doc-4.14.0-115.29.1.el7a.noarch.rpm SHA-256: b26b6ba440bfe477f3e9f19e4bbccb81a4a6d741bad933398862bb8327cdf0ea
kernel-headers-4.14.0-115.29.1.el7a.aarch64.rpm SHA-256: ecb11b410043a7001a5e2645c9b01e2a8d88c6e7673e0b864eb399edf646a86b
kernel-tools-4.14.0-115.29.1.el7a.aarch64.rpm SHA-256: 1dc2138d428c11364d6f5f55cca55b01c6305c080a75af6ee64fad06f650521a
kernel-tools-debuginfo-4.14.0-115.29.1.el7a.aarch64.rpm SHA-256: 5d563eab56f73de1c3d6ee3ec4428c41ee3135215c2d1290b3e872cdf71caef5
kernel-tools-debuginfo-4.14.0-115.29.1.el7a.aarch64.rpm SHA-256: 5d563eab56f73de1c3d6ee3ec4428c41ee3135215c2d1290b3e872cdf71caef5
kernel-tools-libs-4.14.0-115.29.1.el7a.aarch64.rpm SHA-256: 0f151c1500b439f8a304c04bb5974ae95c24be585a515058d01c03df1791de84
kernel-tools-libs-devel-4.14.0-115.29.1.el7a.aarch64.rpm SHA-256: 73852737bc4590f77553bae1c8bdc3c493737c8d2ffa30ad4a80a240943092da
perf-4.14.0-115.29.1.el7a.aarch64.rpm SHA-256: c2df2f1e64d8bbb11764a3bc7c3e2dd986206d07bbf7867184ae8ff10663a615
perf-debuginfo-4.14.0-115.29.1.el7a.aarch64.rpm SHA-256: 8c728dac5f53bc34b57f8d580269d7a5a8f6c637f4d810846eca327ca4449513
perf-debuginfo-4.14.0-115.29.1.el7a.aarch64.rpm SHA-256: 8c728dac5f53bc34b57f8d580269d7a5a8f6c637f4d810846eca327ca4449513
python-perf-4.14.0-115.29.1.el7a.aarch64.rpm SHA-256: 88efd2326bc8248d6fd208f6051c55c5605b0c38b977fb212d2ca0f65f1e062e
python-perf-debuginfo-4.14.0-115.29.1.el7a.aarch64.rpm SHA-256: 2698a0a7ecd45be2d85dafbc8ca9f50c7098688af3f4f122cba5e87f3c8c7758
python-perf-debuginfo-4.14.0-115.29.1.el7a.aarch64.rpm SHA-256: 2698a0a7ecd45be2d85dafbc8ca9f50c7098688af3f4f122cba5e87f3c8c7758

Red Hat Enterprise Linux for Power 9 7

SRPM
kernel-alt-4.14.0-115.29.1.el7a.src.rpm SHA-256: c29e86263698e14f141c81cc6115a5bbebb4d14f151adb5c8f72944074295b2a
ppc64le
kernel-4.14.0-115.29.1.el7a.ppc64le.rpm SHA-256: d337370b09e02977829f764b31d63781bb3ddaaad0bce89bfceb975b790d4d36
kernel-abi-whitelists-4.14.0-115.29.1.el7a.noarch.rpm SHA-256: d5af77ba3d86d8b4eaa7bd6719f451df7326766d6026855c1303f1a6df226490
kernel-bootwrapper-4.14.0-115.29.1.el7a.ppc64le.rpm SHA-256: 3e86074e0a0228771ee07702a1dcd467c1fbab8b81f5af22b4e1f91f9a3a1095
kernel-debug-4.14.0-115.29.1.el7a.ppc64le.rpm SHA-256: 9ac0a0bbad4d366b7575cf38c364a64462fa93a09bbd936889ef069a9e4385ce
kernel-debug-debuginfo-4.14.0-115.29.1.el7a.ppc64le.rpm SHA-256: b0b10f623fecd2413bc9a36a0305a8b1f4bfc65c43246db183d6a942710643e7
kernel-debug-debuginfo-4.14.0-115.29.1.el7a.ppc64le.rpm SHA-256: b0b10f623fecd2413bc9a36a0305a8b1f4bfc65c43246db183d6a942710643e7
kernel-debug-devel-4.14.0-115.29.1.el7a.ppc64le.rpm SHA-256: 062320f54623049482bb1dfa5852a06ac03e7ebf04c196d59cbcd2af991c42d6
kernel-debuginfo-4.14.0-115.29.1.el7a.ppc64le.rpm SHA-256: d1ad6adf1241f8f942b16d3ebf336b9a158d5b31579b3cc517a5063df660809e
kernel-debuginfo-4.14.0-115.29.1.el7a.ppc64le.rpm SHA-256: d1ad6adf1241f8f942b16d3ebf336b9a158d5b31579b3cc517a5063df660809e
kernel-debuginfo-common-ppc64le-4.14.0-115.29.1.el7a.ppc64le.rpm SHA-256: dc883fb33bbdf0302513d025c6b1a169eba3f10dd35bafc1e965940bcd652603
kernel-debuginfo-common-ppc64le-4.14.0-115.29.1.el7a.ppc64le.rpm SHA-256: dc883fb33bbdf0302513d025c6b1a169eba3f10dd35bafc1e965940bcd652603
kernel-devel-4.14.0-115.29.1.el7a.ppc64le.rpm SHA-256: 88f8cccf42ff1eeffb53a4e4cbf976084bf3b6f3cc3b2110e5f09a6e26c3a3d5
kernel-doc-4.14.0-115.29.1.el7a.noarch.rpm SHA-256: b26b6ba440bfe477f3e9f19e4bbccb81a4a6d741bad933398862bb8327cdf0ea
kernel-headers-4.14.0-115.29.1.el7a.ppc64le.rpm SHA-256: 44d757b4fa63553523bfd78b4a2e3e4de6aa89df1c567888a191973331267e9d
kernel-tools-4.14.0-115.29.1.el7a.ppc64le.rpm SHA-256: 571d7be06002fb41d8ab1b6e0b6e494dc54a5e833244cd480adca5933d597e69
kernel-tools-debuginfo-4.14.0-115.29.1.el7a.ppc64le.rpm SHA-256: 560330f626e7221b58091d56fa72934cc06d1cd37b1b9dd8b6fe3ed58d10949d
kernel-tools-debuginfo-4.14.0-115.29.1.el7a.ppc64le.rpm SHA-256: 560330f626e7221b58091d56fa72934cc06d1cd37b1b9dd8b6fe3ed58d10949d
kernel-tools-libs-4.14.0-115.29.1.el7a.ppc64le.rpm SHA-256: 6ded4a8c0761f5f8a951720ba909439916151e1490b3c5b12dd6a14745de7172
kernel-tools-libs-devel-4.14.0-115.29.1.el7a.ppc64le.rpm SHA-256: 43bb3cdb676fd250a1ed47a6178527e604a6a8342572c2ed5fef9a32f1f87d19
perf-4.14.0-115.29.1.el7a.ppc64le.rpm SHA-256: 59f47094a399b09530fbab8c6c2fa699b8bb51dcd1c457605608d951357443d6
perf-debuginfo-4.14.0-115.29.1.el7a.ppc64le.rpm SHA-256: 9aab9de6ca65d7aa06d9ba01e89ce1dadfca17482ecf78659117834cd801b4b9
perf-debuginfo-4.14.0-115.29.1.el7a.ppc64le.rpm SHA-256: 9aab9de6ca65d7aa06d9ba01e89ce1dadfca17482ecf78659117834cd801b4b9
python-perf-4.14.0-115.29.1.el7a.ppc64le.rpm SHA-256: 08a66ea4784b27c22d5709110c6908ba0ebdc8c63ee31bca3d1913726ccb1b90
python-perf-debuginfo-4.14.0-115.29.1.el7a.ppc64le.rpm SHA-256: 803aaad6d07003586dae0ff8e157205ef20456cd0ad486d14a62d4fd567a110d
python-perf-debuginfo-4.14.0-115.29.1.el7a.ppc64le.rpm SHA-256: 803aaad6d07003586dae0ff8e157205ef20456cd0ad486d14a62d4fd567a110d

Red Hat Enterprise Linux for IBM System z (Structure A) 7

SRPM
kernel-alt-4.14.0-115.29.1.el7a.src.rpm SHA-256: c29e86263698e14f141c81cc6115a5bbebb4d14f151adb5c8f72944074295b2a
s390x
kernel-4.14.0-115.29.1.el7a.s390x.rpm SHA-256: a65bc8c8de0a810aae9e20bd5993d745e81eaa26239b76d81189298b4cc1dd1b
kernel-abi-whitelists-4.14.0-115.29.1.el7a.noarch.rpm SHA-256: d5af77ba3d86d8b4eaa7bd6719f451df7326766d6026855c1303f1a6df226490
kernel-debug-4.14.0-115.29.1.el7a.s390x.rpm SHA-256: 86eb9dee289586597a5bcc4fccc1904bb5f1e6958835e9b45b47d29cc02b7b01
kernel-debug-debuginfo-4.14.0-115.29.1.el7a.s390x.rpm SHA-256: fdebb7c2bb309221829d0e8715c594c6b9b8aa6bdee35ef5916dd3c01954cbde
kernel-debug-devel-4.14.0-115.29.1.el7a.s390x.rpm SHA-256: 95a5dea66071e1f1888cc35832567fb690757116d4074468c6afcfe6892641cf
kernel-debuginfo-4.14.0-115.29.1.el7a.s390x.rpm SHA-256: 7c52f1f88483100a453dac28af43410832038b60dd21beb7b8c724c1b153b8bc
kernel-debuginfo-common-s390x-4.14.0-115.29.1.el7a.s390x.rpm SHA-256: feae80335fbd833faf3edd9d0c17fe55f9334c13812021ec828c50a815b5f8f1
kernel-devel-4.14.0-115.29.1.el7a.s390x.rpm SHA-256: edda343db4909b497cfe2ae0f64769e64e7ed8fb21344c11c6b74a8a866bb0af
kernel-doc-4.14.0-115.29.1.el7a.noarch.rpm SHA-256: b26b6ba440bfe477f3e9f19e4bbccb81a4a6d741bad933398862bb8327cdf0ea
kernel-headers-4.14.0-115.29.1.el7a.s390x.rpm SHA-256: a19d111822340d4f21c566405d4d5bc4dd70ed27f3d27251d00ff61c4ec25e2c
kernel-kdump-4.14.0-115.29.1.el7a.s390x.rpm SHA-256: 79276effd7c2eddf24b848f664c3d0c8ba12cf4eb199042fcd6347f2112f5670
kernel-kdump-debuginfo-4.14.0-115.29.1.el7a.s390x.rpm SHA-256: c317682f46d7455e07ae8f4fd70b899f7271c481dbbc809d18ecfeee42482ecf
kernel-kdump-devel-4.14.0-115.29.1.el7a.s390x.rpm SHA-256: bac6a931153852b4d23a59f57d3fcb18fdb8f0c1ac1fbf930869251d821fecd6
perf-4.14.0-115.29.1.el7a.s390x.rpm SHA-256: 135db2c9b6de3878128578fafcfa676c7d7af5c00372425e19aeaa8197c7920b
perf-debuginfo-4.14.0-115.29.1.el7a.s390x.rpm SHA-256: 6a48359235785a965cbd6cfdbb9ee5482a1a89c6ade6e6f550d5cf1b7c0aca4b
python-perf-4.14.0-115.29.1.el7a.s390x.rpm SHA-256: 80cbe5b4556eeeab2bc1b6719ceeeb3e715a3bf1147441bb77e7d4b6d13e7c37
python-perf-debuginfo-4.14.0-115.29.1.el7a.s390x.rpm SHA-256: 905906d677b898ba5ced5cf83a42a0e86bb541be748e3e4c589bc5e0c8fa1e84

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility