Synopsis
Moderate: kernel-rt security and bug fix update
Type/Severity
Security Advisory: Moderate
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS ...
Synopsis
Moderate: kernel security, bug fix, and enhancement update
Type/Severity
Security Advisory: Moderate
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring Syst ...
Several security issues were fixed in the Linux kernel ...
Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks
CVE-2019-2182
Hanjun Guo and Lei Li reported a race condition in the arm64
virtual memory management code, which could lead to an information
disclosure, denial of service (crash), or possibl ...
In the Linux kernel 5021, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattrc when a large old_size value is used in a memset call(CVE-2019-19319)
In the Linux kernel 540-rc2, there is a use-after-free (read) in the __blk_a ...
In the Linux kernel 5021, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattrc when a large old_size value is used in a memset call (CVE-2019-19319) ...
In the Linux kernel 5021, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattrc when a large old_size value is used in a memset call (CVE-2019-19319) ...
In the Linux kernel 5021, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattrc when a large old_size value is used in a memset call (CVE-2019-19319) ...
In the Linux kernel 5021, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattrc when a large old_size value is used in a memset call(CVE-2019-19319)
In the Linux kernel 540-rc2, there is a use-after-free (read) in the __blk_a ...
In the Linux kernel 5021, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattrc when a large old_size value is used in a memset call (CVE-2019-19319) ...