[FEDORA-2019-196ab64d65] Fedora 28: kernel-headers, kernel

Severity Critical
Affected Packages 2
CVEs 41

The 4.20.14 stable kernel update contains a number of important fixes across the
tree. ---- The 4.20.13 stable kernel update contains a number of important
fixes across the tree. ---- The 4.20.12 stable kernel update contains a number
of important fixes across the tree.

Package Affected Version
pkg:rpm/fedora/kernel?distro=fedora-28 < 4.20.14.100.fc28
pkg:rpm/fedora/kernel-headers?distro=fedora-28 < 4.20.14.100.fc28
ID
FEDORA-2019-196ab64d65
Severity
critical
Severity from
CVE-2018-12714
URL
https://bodhi.fedoraproject.org/updates/FEDORA-2019-196ab64d65
Published
2019-03-11T20:20:34
(5 years ago)
Modified
2019-03-11T20:20:34
(5 years ago)
Rights
Copyright 2019 Red Hat, Inc.
Other Advisories
Source # ID Name URL
Bugzilla 1686136 Bug #1686136 - CVE-2019-9213 kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms https://bugzilla.redhat.com/show_bug.cgi?id=1686136
Bugzilla 1683191 Bug #1683191 - CVE-2019-9162 kernel: out-of-bounds read/write in et/ipv4/netfilter/nf_nat_snmp_basic_main.c in the SNMP NAT module https://bugzilla.redhat.com/show_bug.cgi?id=1683191
Bugzilla 1679972 Bug #1679972 - CVE-2019-8980 kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service https://bugzilla.redhat.com/show_bug.cgi?id=1679972
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/fedora/kernel?distro=fedora-28 fedora kernel < 4.20.14.100.fc28 fedora-28
Affected pkg:rpm/fedora/kernel-headers?distro=fedora-28 fedora kernel-headers < 4.20.14.100.fc28 fedora-28
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...