Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2020:5079 - Security Advisory
Issued:
2020-11-10
Updated:
2020-11-10

RHSA-2020:5079 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel-alt security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel-alt is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel-alt packages provide the Linux kernel version 4.x.

Security Fix(es):

  • kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS (CVE-2020-25641)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • RHEL-Alt-7.6 - kernel "Oops: Kernel access of bad area" in crypto_unregister_instance while running LTP testcase crypto_user02 (BZ#1882230)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for ARM 64 7 aarch64
  • Red Hat Enterprise Linux for Power 9 7 ppc64le
  • Red Hat Enterprise Linux for IBM System z (Structure A) 7 s390x

Fixes

  • BZ - 1881424 - CVE-2020-25641 kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS

CVEs

  • CVE-2020-25641

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for ARM 64 7

SRPM
kernel-alt-4.14.0-115.33.1.el7a.src.rpm SHA-256: 48d10a235054793e21bbafecabae9ee0ca4ac3cf62b4ea2b9951ea0f7c1f45c7
aarch64
kernel-4.14.0-115.33.1.el7a.aarch64.rpm SHA-256: c8ee2a06100d35f23a42c223e9cc6f8d930be541869b0c55af579cddc09bb3b6
kernel-abi-whitelists-4.14.0-115.33.1.el7a.noarch.rpm SHA-256: ac8a7dd3378f89e2ceb0c8d7cc0360d047d627ac21bfd43734086c8cdb137a5e
kernel-debug-4.14.0-115.33.1.el7a.aarch64.rpm SHA-256: 7201a756ee4eac79573262eab4230c6a449db625110a5f1319b00025e365a0da
kernel-debug-debuginfo-4.14.0-115.33.1.el7a.aarch64.rpm SHA-256: fb96bfbceacdad8f2005f0c6fb196b24cb5d5d3d0046954aa7832d7bbf9d5a55
kernel-debug-debuginfo-4.14.0-115.33.1.el7a.aarch64.rpm SHA-256: fb96bfbceacdad8f2005f0c6fb196b24cb5d5d3d0046954aa7832d7bbf9d5a55
kernel-debug-devel-4.14.0-115.33.1.el7a.aarch64.rpm SHA-256: 85bc3dc75486843a90a6d46a599d6980f3560c08c13b2f62954e2ec1c88bb634
kernel-debuginfo-4.14.0-115.33.1.el7a.aarch64.rpm SHA-256: bbc6f62cc2cee7c23c1386f1252a27022fd5f1c4626a231b0023747036841677
kernel-debuginfo-4.14.0-115.33.1.el7a.aarch64.rpm SHA-256: bbc6f62cc2cee7c23c1386f1252a27022fd5f1c4626a231b0023747036841677
kernel-debuginfo-common-aarch64-4.14.0-115.33.1.el7a.aarch64.rpm SHA-256: 94e2b376da4bf591555850adb87a0296f20c2327efcc0eb0e79c1a929cb1e206
kernel-debuginfo-common-aarch64-4.14.0-115.33.1.el7a.aarch64.rpm SHA-256: 94e2b376da4bf591555850adb87a0296f20c2327efcc0eb0e79c1a929cb1e206
kernel-devel-4.14.0-115.33.1.el7a.aarch64.rpm SHA-256: 4f29bdc9cdf42d1061706d8fc8e714489900e088a0d483c84cfe5b0c7cc77ffb
kernel-doc-4.14.0-115.33.1.el7a.noarch.rpm SHA-256: 4584b2772d4315684cf24c66694bc3379e80db4626eb59c958dacdcda1b12538
kernel-doc-4.14.0-115.33.1.el7a.noarch.rpm SHA-256: 4584b2772d4315684cf24c66694bc3379e80db4626eb59c958dacdcda1b12538
kernel-headers-4.14.0-115.33.1.el7a.aarch64.rpm SHA-256: 043ce8552b255acb234202b9e0b3332ba2449476c2d515a3135204873e39321b
kernel-tools-4.14.0-115.33.1.el7a.aarch64.rpm SHA-256: 0956dd95f336dcb7410727c4cca4a6dddc9dd7eef19ca9b4be6a292cd22c8371
kernel-tools-debuginfo-4.14.0-115.33.1.el7a.aarch64.rpm SHA-256: 32a174dcced435239f5e5c637a7cfb68fdc1e2e47a297a064153ab10e6b20c06
kernel-tools-debuginfo-4.14.0-115.33.1.el7a.aarch64.rpm SHA-256: 32a174dcced435239f5e5c637a7cfb68fdc1e2e47a297a064153ab10e6b20c06
kernel-tools-libs-4.14.0-115.33.1.el7a.aarch64.rpm SHA-256: a60ced6982ba54eec7a5e06cb74856b34ad35d81ce2c3d2996f319665954f05b
kernel-tools-libs-devel-4.14.0-115.33.1.el7a.aarch64.rpm SHA-256: 0c9a3ceffea58eb67bf270c84d59562a7efe619a078e0f58ecee66a9ce183fa5
perf-4.14.0-115.33.1.el7a.aarch64.rpm SHA-256: 4d9bc1c5bdac65583afbb92208e9c20943ee42553e91e113b0bcdc2986226b2c
perf-debuginfo-4.14.0-115.33.1.el7a.aarch64.rpm SHA-256: 919999c204947c39f8c0d1be3d690586c551e1e65181921837b64ac3b2065a12
perf-debuginfo-4.14.0-115.33.1.el7a.aarch64.rpm SHA-256: 919999c204947c39f8c0d1be3d690586c551e1e65181921837b64ac3b2065a12
python-perf-4.14.0-115.33.1.el7a.aarch64.rpm SHA-256: dea7b2296ee01378866e3924eec9f7c3b82a843ef9db0e71f4b2b444e7a8365f
python-perf-debuginfo-4.14.0-115.33.1.el7a.aarch64.rpm SHA-256: 731310656370d2c9503ade1a731200840136d337c0938aa190c9b6b753801952
python-perf-debuginfo-4.14.0-115.33.1.el7a.aarch64.rpm SHA-256: 731310656370d2c9503ade1a731200840136d337c0938aa190c9b6b753801952

Red Hat Enterprise Linux for Power 9 7

SRPM
kernel-alt-4.14.0-115.33.1.el7a.src.rpm SHA-256: 48d10a235054793e21bbafecabae9ee0ca4ac3cf62b4ea2b9951ea0f7c1f45c7
ppc64le
kernel-4.14.0-115.33.1.el7a.ppc64le.rpm SHA-256: f349c3f173b8d280fbc6c2d911744c7d96b8b2f7d02f3ef28e71486ae697e100
kernel-abi-whitelists-4.14.0-115.33.1.el7a.noarch.rpm SHA-256: ac8a7dd3378f89e2ceb0c8d7cc0360d047d627ac21bfd43734086c8cdb137a5e
kernel-bootwrapper-4.14.0-115.33.1.el7a.ppc64le.rpm SHA-256: 207cc15ff961d49c4c7a7c5f67ba495cbec18ec50b500864f0a86e695b8493f5
kernel-debug-4.14.0-115.33.1.el7a.ppc64le.rpm SHA-256: f4990a2d864ba71c1568d0582930a27166c495ad5c512777ef51e04afc4e9ec3
kernel-debug-debuginfo-4.14.0-115.33.1.el7a.ppc64le.rpm SHA-256: 034e4fde79184cb2b5620d3855ab1d71acc2c1b8bd61a0ca8220e8d1552b7ff8
kernel-debug-debuginfo-4.14.0-115.33.1.el7a.ppc64le.rpm SHA-256: 034e4fde79184cb2b5620d3855ab1d71acc2c1b8bd61a0ca8220e8d1552b7ff8
kernel-debug-devel-4.14.0-115.33.1.el7a.ppc64le.rpm SHA-256: 3b09d5c1da4410650ab1f1dc2316a5bddecb0caa9a40e7fff2711ace67c8143d
kernel-debuginfo-4.14.0-115.33.1.el7a.ppc64le.rpm SHA-256: a6253cb5a7b51c75383f2c652756dd15e7686144654b48d7b29d4573c4f519a7
kernel-debuginfo-4.14.0-115.33.1.el7a.ppc64le.rpm SHA-256: a6253cb5a7b51c75383f2c652756dd15e7686144654b48d7b29d4573c4f519a7
kernel-debuginfo-common-ppc64le-4.14.0-115.33.1.el7a.ppc64le.rpm SHA-256: f1c047a15b55313eca2f47cfddcd542cc2a45716622e091975538496df0f76f4
kernel-debuginfo-common-ppc64le-4.14.0-115.33.1.el7a.ppc64le.rpm SHA-256: f1c047a15b55313eca2f47cfddcd542cc2a45716622e091975538496df0f76f4
kernel-devel-4.14.0-115.33.1.el7a.ppc64le.rpm SHA-256: 0adb4e668334786fd42186c55e95329bbf87a16631026f97ee03b9b35ff22d7b
kernel-doc-4.14.0-115.33.1.el7a.noarch.rpm SHA-256: 4584b2772d4315684cf24c66694bc3379e80db4626eb59c958dacdcda1b12538
kernel-headers-4.14.0-115.33.1.el7a.ppc64le.rpm SHA-256: edfb5ffe090266bbaaa40eab4e02b4560745ea60916dd0798e3bd63fa840acbe
kernel-tools-4.14.0-115.33.1.el7a.ppc64le.rpm SHA-256: e0a83daef8369375bf8b55ccd3c8630fdddd9f0c84f30e8c6b27d8c87a527445
kernel-tools-debuginfo-4.14.0-115.33.1.el7a.ppc64le.rpm SHA-256: 7847b8fc7d09fb300819da246714b7c7a94aea7566b6abda91b78e24afaf25d4
kernel-tools-debuginfo-4.14.0-115.33.1.el7a.ppc64le.rpm SHA-256: 7847b8fc7d09fb300819da246714b7c7a94aea7566b6abda91b78e24afaf25d4
kernel-tools-libs-4.14.0-115.33.1.el7a.ppc64le.rpm SHA-256: 645cf5e437a839fa57629047b4f7182282750bc94a9850e6cd0eba899985ae4c
kernel-tools-libs-devel-4.14.0-115.33.1.el7a.ppc64le.rpm SHA-256: 139bb30dd248b3ffe4b67b36c60bedf467f3a5860b06d676b7f8f3e217e502d9
perf-4.14.0-115.33.1.el7a.ppc64le.rpm SHA-256: 8566b979ba7838a1a90fd85835ab52ce60a54522663e9a531b27e8d73aa8fa3b
perf-debuginfo-4.14.0-115.33.1.el7a.ppc64le.rpm SHA-256: aca8194a74f62404535672691344a557ebc768093825d5affbb3f44fcfa0c6d0
perf-debuginfo-4.14.0-115.33.1.el7a.ppc64le.rpm SHA-256: aca8194a74f62404535672691344a557ebc768093825d5affbb3f44fcfa0c6d0
python-perf-4.14.0-115.33.1.el7a.ppc64le.rpm SHA-256: 27397b189d2a3d566e82eb6bd543850698b221d584e2a9de1e18a9f85226e055
python-perf-debuginfo-4.14.0-115.33.1.el7a.ppc64le.rpm SHA-256: 0311f69b4df51cef8461971974d7c7068acb14a83469bfe64aad7727ae649029
python-perf-debuginfo-4.14.0-115.33.1.el7a.ppc64le.rpm SHA-256: 0311f69b4df51cef8461971974d7c7068acb14a83469bfe64aad7727ae649029

Red Hat Enterprise Linux for IBM System z (Structure A) 7

SRPM
kernel-alt-4.14.0-115.33.1.el7a.src.rpm SHA-256: 48d10a235054793e21bbafecabae9ee0ca4ac3cf62b4ea2b9951ea0f7c1f45c7
s390x
kernel-4.14.0-115.33.1.el7a.s390x.rpm SHA-256: d09048a340dd5cf088d73119314eeb60e67cb5a4442168347ceb68b19a79bbfd
kernel-abi-whitelists-4.14.0-115.33.1.el7a.noarch.rpm SHA-256: ac8a7dd3378f89e2ceb0c8d7cc0360d047d627ac21bfd43734086c8cdb137a5e
kernel-debug-4.14.0-115.33.1.el7a.s390x.rpm SHA-256: eabdccc92977cb60f66d16d94a529b6b7f8aa33672d6173ae6aaacf70e33342f
kernel-debug-debuginfo-4.14.0-115.33.1.el7a.s390x.rpm SHA-256: 669e4f10bbed0b8ec33fb281362263d165d9811403d3a95db5131c7c0cb5e99b
kernel-debug-devel-4.14.0-115.33.1.el7a.s390x.rpm SHA-256: 13e73b122918319a4fe13820ca2cbab627496670b438c73fc5fcd150323b3505
kernel-debuginfo-4.14.0-115.33.1.el7a.s390x.rpm SHA-256: d1bf79bc9aaa241a3375aab96af2691a21b2eef0c16384dc51578f9f341c8e9a
kernel-debuginfo-common-s390x-4.14.0-115.33.1.el7a.s390x.rpm SHA-256: b839b70294c585e15f4e510eace6b6f1f9cf910c58798229e84567efcdf85588
kernel-devel-4.14.0-115.33.1.el7a.s390x.rpm SHA-256: 3ffdca089a9a2a1b10bdcb0fe75d3d18873cf9369f123b7aba62ed17eccc540d
kernel-doc-4.14.0-115.33.1.el7a.noarch.rpm SHA-256: 4584b2772d4315684cf24c66694bc3379e80db4626eb59c958dacdcda1b12538
kernel-headers-4.14.0-115.33.1.el7a.s390x.rpm SHA-256: 194f4418b280d8b050709b29e8ebea47c0aa995b5a14ff099baae2ae67feb65c
kernel-kdump-4.14.0-115.33.1.el7a.s390x.rpm SHA-256: ddfd72ef494193cc95d34f4600c8ae212a872f6f3408e726838c2c861962ff58
kernel-kdump-debuginfo-4.14.0-115.33.1.el7a.s390x.rpm SHA-256: 591f38eda8cd8bc0b579602ff054483ab6b5bb8148a2876cee49cd03de8879fd
kernel-kdump-devel-4.14.0-115.33.1.el7a.s390x.rpm SHA-256: 4a1ea2f9b6c845f87561ff02379534c9330af9072f71f50604c1f943cdcd8ab7
perf-4.14.0-115.33.1.el7a.s390x.rpm SHA-256: 3bd713001ebe17744410a908c40472e6b66ae89a62b8533d4eaec85e013967ec
perf-debuginfo-4.14.0-115.33.1.el7a.s390x.rpm SHA-256: c6c5c4f686f24b8b6524f0975ae11189de65604012c7c1bfaa564d38fad91d33
python-perf-4.14.0-115.33.1.el7a.s390x.rpm SHA-256: cf2a4921c950de43517a979652a2d2a78ec660c557206ed2ac276479311e38a6
python-perf-debuginfo-4.14.0-115.33.1.el7a.s390x.rpm SHA-256: a638bc2d630c6b3e64fc5e635a1b3dca1f28fc0a0f78c7e954c05f8cf2c6790a

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility