You are here
Home > Preporuke > Sigurnosni nedostaci jezgre operativnog sustava

Sigurnosni nedostaci jezgre operativnog sustava

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2019-196ab64d65
2019-03-11 20:19:50.942086
——————————————————————————–

Name : kernel-headers
Product : Fedora 28
Version : 4.20.14
Release : 100.fc28
URL : http://www.kernel.org/
Summary : Header files for the Linux kernel for use by glibc
Description :
Kernel-headers includes the C header files that specify the interface
between the Linux kernel and userspace libraries and programs. The
header files define structures and constants that are needed for
building most standard programs and are also needed for rebuilding the
glibc package.

——————————————————————————–
Update Information:

The 4.20.14 stable kernel update contains a number of important fixes across the
tree. —- The 4.20.13 stable kernel update contains a number of important
fixes across the tree. —- The 4.20.12 stable kernel update contains a number
of important fixes across the tree.
——————————————————————————–
References:

[ 1 ] Bug #1679972 – CVE-2019-8980 kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service
https://bugzilla.redhat.com/show_bug.cgi?id=1679972
[ 2 ] Bug #1683191 – CVE-2019-9162 kernel: out-of-bounds read/write in et/ipv4/netfilter/nf_nat_snmp_basic_main.c in the SNMP NAT module
https://bugzilla.redhat.com/show_bug.cgi?id=1683191
[ 3 ] Bug #1686136 – CVE-2019-9213 kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms
https://bugzilla.redhat.com/show_bug.cgi?id=1686136
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2019-196ab64d65’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

AutorJosip Papratovic
Cert idNCERT-REF-2019-03-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programske bibiloteke libcomps

Otkriven je sigurnosni nedostatak u programskoj biblioteci libcomps za operacijski sustav openSUSE. Otkriveni nedostatak potencijalnim napadačima omogućuje izvršavanje proizvoljnog programskog...

Close