var-201909-0695
Vulnerability from variot
A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc. ========================================================================= Ubuntu Security Notice USN-4135-1 September 18, 2019
linux, linux-aws, linux-aws-hwe, linux-azure, linux-gcp, linux-gke-4.15, linux-gke-5.0, linux-hwe, linux-kvm, linux-oem, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities ========================================================================= A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.04
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in the Linux kernel. (CVE-2019-14835)
It was discovered that the Linux kernel on PowerPC architectures did not properly handle Facility Unavailable exceptions in some situations. A local attacker could use this to expose sensitive information. (CVE-2019-15030)
It was discovered that the Linux kernel on PowerPC architectures did not properly handle exceptions on interrupts in some situations. A local attacker could use this to expose sensitive information. (CVE-2019-15031)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 19.04: linux-image-5.0.0-1016-aws 5.0.0-1016.18 linux-image-5.0.0-1017-gcp 5.0.0-1017.17 linux-image-5.0.0-1017-kvm 5.0.0-1017.18 linux-image-5.0.0-1017-raspi2 5.0.0-1017.17 linux-image-5.0.0-1020-azure 5.0.0-1020.21 linux-image-5.0.0-1021-snapdragon 5.0.0-1021.22 linux-image-5.0.0-29-generic 5.0.0-29.31 linux-image-5.0.0-29-generic-lpae 5.0.0-29.31 linux-image-5.0.0-29-lowlatency 5.0.0-29.31 linux-image-aws 5.0.0.1016.17 linux-image-azure 5.0.0.1020.19 linux-image-gcp 5.0.0.1017.43 linux-image-generic 5.0.0.29.30 linux-image-generic-lpae 5.0.0.29.30 linux-image-gke 5.0.0.1017.43 linux-image-kvm 5.0.0.1017.17 linux-image-lowlatency 5.0.0.29.30 linux-image-raspi2 5.0.0.1017.14 linux-image-snapdragon 5.0.0.1021.14 linux-image-virtual 5.0.0.29.30
Ubuntu 18.04 LTS: linux-image-4.15.0-1025-oracle 4.15.0-1025.28 linux-image-4.15.0-1044-gcp 4.15.0-1044.70 linux-image-4.15.0-1044-gke 4.15.0-1044.46 linux-image-4.15.0-1046-kvm 4.15.0-1046.46 linux-image-4.15.0-1047-raspi2 4.15.0-1047.51 linux-image-4.15.0-1050-aws 4.15.0-1050.52 linux-image-4.15.0-1056-oem 4.15.0-1056.65 linux-image-4.15.0-1064-snapdragon 4.15.0-1064.71 linux-image-4.15.0-64-generic 4.15.0-64.73 linux-image-4.15.0-64-generic-lpae 4.15.0-64.73 linux-image-4.15.0-64-lowlatency 4.15.0-64.73 linux-image-5.0.0-1017-gke 5.0.0-1017.17~18.04.1 linux-image-5.0.0-1020-azure 5.0.0-1020.21~18.04.1 linux-image-5.0.0-29-generic 5.0.0-29.31~18.04.1 linux-image-5.0.0-29-generic-lpae 5.0.0-29.31~18.04.1 linux-image-5.0.0-29-lowlatency 5.0.0-29.31~18.04.1 linux-image-aws 4.15.0.1050.49 linux-image-azure 5.0.0.1020.30 linux-image-gcp 4.15.0.1044.70 linux-image-generic 4.15.0.64.66 linux-image-generic-hwe-18.04 5.0.0.29.86 linux-image-generic-lpae 4.15.0.64.66 linux-image-generic-lpae-hwe-18.04 5.0.0.29.86 linux-image-gke 4.15.0.1044.47 linux-image-gke-4.15 4.15.0.1044.47 linux-image-gke-5.0 5.0.0.1017.7 linux-image-kvm 4.15.0.1046.46 linux-image-lowlatency 4.15.0.64.66 linux-image-lowlatency-hwe-18.04 5.0.0.29.86 linux-image-oem 4.15.0.1056.60 linux-image-oracle 4.15.0.1025.28 linux-image-powerpc-e500mc 4.15.0.64.66 linux-image-powerpc-smp 4.15.0.64.66 linux-image-powerpc64-emb 4.15.0.64.66 linux-image-powerpc64-smp 4.15.0.64.66 linux-image-raspi2 4.15.0.1047.45 linux-image-snapdragon 4.15.0.1064.67 linux-image-snapdragon-hwe-18.04 5.0.0.29.86 linux-image-virtual 4.15.0.64.66 linux-image-virtual-hwe-18.04 5.0.0.29.86
Ubuntu 16.04 LTS: linux-image-4.15.0-1025-oracle 4.15.0-1025.28~16.04.1 linux-image-4.15.0-1044-gcp 4.15.0-1044.46 linux-image-4.15.0-1050-aws 4.15.0-1050.52~16.04.1 linux-image-4.15.0-1059-azure 4.15.0-1059.64 linux-image-4.15.0-64-generic 4.15.0-64.73~16.04.1 linux-image-4.15.0-64-generic-lpae 4.15.0-64.73~16.04.1 linux-image-4.15.0-64-lowlatency 4.15.0-64.73~16.04.1 linux-image-4.4.0-1058-kvm 4.4.0-1058.65 linux-image-4.4.0-1094-aws 4.4.0-1094.105 linux-image-4.4.0-1122-raspi2 4.4.0-1122.131 linux-image-4.4.0-1126-snapdragon 4.4.0-1126.132 linux-image-4.4.0-164-generic 4.4.0-164.192 linux-image-4.4.0-164-generic-lpae 4.4.0-164.192 linux-image-4.4.0-164-lowlatency 4.4.0-164.192 linux-image-4.4.0-164-powerpc-e500mc 4.4.0-164.192 linux-image-4.4.0-164-powerpc-smp 4.4.0-164.192 linux-image-4.4.0-164-powerpc64-emb 4.4.0-164.192 linux-image-4.4.0-164-powerpc64-smp 4.4.0-164.192 linux-image-aws 4.4.0.1094.98 linux-image-aws-hwe 4.15.0.1050.50 linux-image-azure 4.15.0.1059.62 linux-image-gcp 4.15.0.1044.58 linux-image-generic 4.4.0.164.172 linux-image-generic-hwe-16.04 4.15.0.64.84 linux-image-generic-lpae 4.4.0.164.172 linux-image-generic-lpae-hwe-16.04 4.15.0.64.84 linux-image-gke 4.15.0.1044.58 linux-image-kvm 4.4.0.1058.58 linux-image-lowlatency 4.4.0.164.172 linux-image-lowlatency-hwe-16.04 4.15.0.64.84 linux-image-oem 4.15.0.64.84 linux-image-oracle 4.15.0.1025.18 linux-image-powerpc-e500mc 4.4.0.164.172 linux-image-powerpc-smp 4.4.0.164.172 linux-image-powerpc64-emb 4.4.0.164.172 linux-image-powerpc64-smp 4.4.0.164.172 linux-image-raspi2 4.4.0.1122.122 linux-image-snapdragon 4.4.0.1126.118 linux-image-virtual 4.4.0.164.172 linux-image-virtual-hwe-16.04 4.15.0.64.84
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. 7.3) - noarch, x86_64
-
(CVE-2019-14835)
-
kernel: hw: Spectre SWAPGS gadget vulnerability (CVE-2019-1125)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
-
fs deadlock when a memory allocation waits on page writeback in NOFS context (BZ#1729105)
-
fragmented packets timing out (BZ#1729410)
-
kernel build: speed up debuginfo extraction (BZ#1731461)
-
use "make -jN" for modules_install (BZ#1735080)
-
shmem: consider shm_mnt as a long-term mount (BZ#1737375)
-
Backport TCP follow-up for small buffers (BZ#1739126)
Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/linux-4.4.199/: Upgraded. These updates fix various bugs and security issues. Be sure to upgrade your initrd after upgrading the kernel packages. If you use lilo to boot your machine, be sure lilo.conf points to the correct kernel and initrd and run lilo as root to update the bootloader. If you use elilo to boot your machine, you should run eliloconfig to copy the kernel and initrd to the EFI System Partition. For more information, see: Fixed in 4.4.191: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15118 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10906 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10905 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15117 Fixed in 4.4.193: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14835 Fixed in 4.4.194: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14816 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14814 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15505 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14821 Fixed in 4.4.195: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17053 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17052 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17056 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17055 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17054 Fixed in 4.4.196: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2215 Fixed in 4.4.197: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16746 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20976 Fixed in 4.4.198: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17075 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17133 Fixed in 4.4.199: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15098 ( Security fix *) +--------------------------+
Where to find the new packages: +-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.
Updated packages for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-generic-4.4.199-i586-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-generic-smp-4.4.199_smp-i686-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-headers-4.4.199_smp-x86-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-huge-4.4.199-i586-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-huge-smp-4.4.199_smp-i686-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-modules-4.4.199-i586-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-modules-smp-4.4.199_smp-i686-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-source-4.4.199_smp-noarch-1.txz
Updated packages for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.199/kernel-generic-4.4.199-x86_64-1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.199/kernel-headers-4.4.199-x86-1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.199/kernel-huge-4.4.199-x86_64-1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.199/kernel-modules-4.4.199-x86_64-1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.199/kernel-source-4.4.199-noarch-1.txz
MD5 signatures: +-------------+
Slackware 14.2 packages:
0e523f42e759ecc2399f36e37672f110 kernel-generic-4.4.199-i586-1.txz ee6451f5362008b46fee2e08e3077b21 kernel-generic-smp-4.4.199_smp-i686-1.txz a8338ef88f2e3ea9c74d564c36ccd420 kernel-headers-4.4.199_smp-x86-1.txz cd9e9c241e4eec2fba1dae658a28870e kernel-huge-4.4.199-i586-1.txz 842030890a424023817d42a83a86a7f4 kernel-huge-smp-4.4.199_smp-i686-1.txz 257db024bb4501548ac9118dbd2d9ae6 kernel-modules-4.4.199-i586-1.txz 96377cbaf7bca55aaca70358c63151a7 kernel-modules-smp-4.4.199_smp-i686-1.txz 0673e86466f9e624964d95107cf6712f kernel-source-4.4.199_smp-noarch-1.txz
Slackware x86_64 14.2 packages: 6d1ff428e7cad6caa8860acc402447a1 kernel-generic-4.4.199-x86_64-1.txz dadc091dc725b8227e0d1e35098d6416 kernel-headers-4.4.199-x86-1.txz f5f4c034203f44dd1513ad3504c42515 kernel-huge-4.4.199-x86_64-1.txz a5337cd8b2ca80d4d93b9e9688e42b03 kernel-modules-4.4.199-x86_64-1.txz 5dd6e46c04f37b97062dc9e52cc38add kernel-source-4.4.199-noarch-1.txz
Installation instructions: +------------------------+
Upgrade the packages as root:
upgradepkg kernel-*.txz
If you are using an initrd, you'll need to rebuild it.
For a 32-bit SMP machine, use this command (substitute the appropriate kernel version if you are not running Slackware 14.2):
/usr/share/mkinitrd/mkinitrd_command_generator.sh -k 4.4.199-smp | bash
For a 64-bit machine, or a 32-bit uniprocessor machine, use this command (substitute the appropriate kernel version if you are not running Slackware 14.2):
/usr/share/mkinitrd/mkinitrd_command_generator.sh -k 4.4.199 | bash
Please note that "uniprocessor" has to do with the kernel you are running, not with the CPU. Most systems should run the SMP kernel (if they can) regardless of the number of cores the CPU has. If you aren't sure which kernel you are running, run "uname -a". If you see SMP there, you are running the SMP kernel and should use the 4.4.199-smp version when running mkinitrd_command_generator. Note that this is only for 32-bit -- 64-bit systems should always use 4.4.199 as the version.
If you are using lilo or elilo to boot the machine, you'll need to ensure that the machine is properly prepared before rebooting.
If using LILO: By default, lilo.conf contains an image= line that references a symlink that always points to the correct kernel. No editing should be required unless your machine uses a custom lilo.conf. If that is the case, be sure that the image= line references the correct kernel file. Either way, you'll need to run "lilo" as root to reinstall the boot loader.
If using elilo: Ensure that the /boot/vmlinuz symlink is pointing to the kernel you wish to use, and then run eliloconfig to update the EFI System Partition.
+-----+
Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com
+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address.
CVE-2019-14821
Matt Delco reported a race condition in KVM's coalesced MMIO
facility, which could lead to out-of-bounds access in the kernel.
A local attacker permitted to access /dev/kvm could use this to
cause a denial of service (memory corruption or crash) or possibly
for privilege escalation.
CVE-2019-14835
Peter Pi of Tencent Blade Team discovered a missing bounds check
in vhost_net, the network back-end driver for KVM hosts, leading
to a buffer overflow when the host begins live migration of a VM.
An attacker in control of a VM could use this to cause a denial of
service (memory corruption or crash) or possibly for privilege
escalation on the host.
CVE-2019-15117
Hui Peng and Mathias Payer reported a missing bounds check in the
usb-audio driver's descriptor parsing code, leading to a buffer
over-read. An attacker able to add USB devices could possibly use
this to cause a denial of service (crash).
CVE-2019-15118
Hui Peng and Mathias Payer reported unbounded recursion in the
usb-audio driver's descriptor parsing code, leading to a stack
overflow. An attacker able to add USB devices could use this to
cause a denial of service (memory corruption or crash) or possibly
for privilege escalation. On the amd64 architecture, and on the
arm64 architecture in buster, this is mitigated by a guard page
on the kernel stack, so that it is only possible to cause a crash.
CVE-2019-15902
Brad Spengler reported that a backporting error reintroduced a
spectre-v1 vulnerability in the ptrace subsystem in the
ptrace_get_debugreg() function.
For the oldstable distribution (stretch), these problems have been fixed in version 4.9.189-3+deb9u1.
For the stable distribution (buster), these problems have been fixed in version 4.19.67-2+deb10u1.
For the detailed security status of linux please refer to its security tracker page at: https://security-tracker.debian.org/tracker/linux
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl2K5xlfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0Sj8xAAnBGWzlmy5RyQe8VCE3kkMpwmH/00I5IFpjTbAVvyHzKVYl96YbY1YuAP ID++cBxBElWCQriwCESc5Um/BGpOMmTa3VlkXIVy6uHgwt1Hn+ZW/syFaGt0/brW eKIecVQLyZaV7OOx4Q+J9H5WN1FNKoV3BCsfUFlRqNCUtYQ46X7pN+gyytW4KbZo AEbPkEdUhv2Z6ndq8Z/OJ5cyYms+OonEt08e2qcN0Ig+qRY9l3fgSn/X3tKQiuJj jGKPkd0VYrFzfDKekcboIBZyegahReRe4k+V8I+o/acuQJGR1cV/qCGxboFFI2+s WeSUhaVixP+7HLXyRljFBdvXlAnx/IajEPG+RAVt6zZs1yK+8bVIhai5TarcwbF3 DWQZvpAeLaKgIN4x7s7xDHNJzO9Ea9fhXm/9T1AoaO3wdN2zjOYHLG3YO4TF0PpF rYY9t17uNdAuCxPeQWCciDOiNQVbEmr3+al/78m2VZcBYEI2s1E9fgQJV21rRlv+ fEavwX9OJg6GKcW9v6cyegyf4gfTvjyzIP/rcmn55hiQ9vjVNykkoNUES5Do6sTb /pSSRuUpJtEE+6LnnqbdD0E6l8SC6zgA/+Pu/7BrACxlk9bhYFmVaAwbPPEuRgrz 3d87MB8FEHu4RDGSgomb849wuAXnEVDwM034VtURUSEAXVFQ0dY=Wqdv -----END PGP SIGNATURE----- . 8) - x86_64
- Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel security update Advisory ID: RHSA-2019:2863-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:2863 Issue date: 2019-09-23 CVE Names: CVE-2019-14835 ==================================================================== 1. Summary:
An update for kernel is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
- Description:
The kernel packages contain the Linux kernel, the core of any Linux operating system. (CVE-2019-14835)
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
- Bugs fixed (https://bugzilla.redhat.com/):
1750727 - CVE-2019-14835 kernel: vhost-net: guest to host kernel escape during migration
- Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source: kernel-2.6.32-754.23.1.el6.src.rpm
i386: kernel-2.6.32-754.23.1.el6.i686.rpm kernel-debug-2.6.32-754.23.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-754.23.1.el6.i686.rpm kernel-debug-devel-2.6.32-754.23.1.el6.i686.rpm kernel-debuginfo-2.6.32-754.23.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-754.23.1.el6.i686.rpm kernel-devel-2.6.32-754.23.1.el6.i686.rpm kernel-headers-2.6.32-754.23.1.el6.i686.rpm perf-2.6.32-754.23.1.el6.i686.rpm perf-debuginfo-2.6.32-754.23.1.el6.i686.rpm python-perf-debuginfo-2.6.32-754.23.1.el6.i686.rpm
noarch: kernel-abi-whitelists-2.6.32-754.23.1.el6.noarch.rpm kernel-doc-2.6.32-754.23.1.el6.noarch.rpm kernel-firmware-2.6.32-754.23.1.el6.noarch.rpm
x86_64: kernel-2.6.32-754.23.1.el6.x86_64.rpm kernel-debug-2.6.32-754.23.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-754.23.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-754.23.1.el6.i686.rpm kernel-debug-devel-2.6.32-754.23.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.23.1.el6.i686.rpm kernel-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-754.23.1.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-754.23.1.el6.x86_64.rpm kernel-devel-2.6.32-754.23.1.el6.x86_64.rpm kernel-headers-2.6.32-754.23.1.el6.x86_64.rpm perf-2.6.32-754.23.1.el6.x86_64.rpm perf-debuginfo-2.6.32-754.23.1.el6.i686.rpm perf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.23.1.el6.i686.rpm python-perf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
i386: kernel-debug-debuginfo-2.6.32-754.23.1.el6.i686.rpm kernel-debuginfo-2.6.32-754.23.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-754.23.1.el6.i686.rpm perf-debuginfo-2.6.32-754.23.1.el6.i686.rpm python-perf-2.6.32-754.23.1.el6.i686.rpm python-perf-debuginfo-2.6.32-754.23.1.el6.i686.rpm
x86_64: kernel-debug-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-754.23.1.el6.x86_64.rpm perf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm python-perf-2.6.32-754.23.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: kernel-2.6.32-754.23.1.el6.src.rpm
noarch: kernel-abi-whitelists-2.6.32-754.23.1.el6.noarch.rpm kernel-doc-2.6.32-754.23.1.el6.noarch.rpm kernel-firmware-2.6.32-754.23.1.el6.noarch.rpm
x86_64: kernel-2.6.32-754.23.1.el6.x86_64.rpm kernel-debug-2.6.32-754.23.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-754.23.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-754.23.1.el6.i686.rpm kernel-debug-devel-2.6.32-754.23.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.23.1.el6.i686.rpm kernel-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-754.23.1.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-754.23.1.el6.x86_64.rpm kernel-devel-2.6.32-754.23.1.el6.x86_64.rpm kernel-headers-2.6.32-754.23.1.el6.x86_64.rpm perf-2.6.32-754.23.1.el6.x86_64.rpm perf-debuginfo-2.6.32-754.23.1.el6.i686.rpm perf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.23.1.el6.i686.rpm python-perf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
x86_64: kernel-debug-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-754.23.1.el6.x86_64.rpm perf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm python-perf-2.6.32-754.23.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: kernel-2.6.32-754.23.1.el6.src.rpm
i386: kernel-2.6.32-754.23.1.el6.i686.rpm kernel-debug-2.6.32-754.23.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-754.23.1.el6.i686.rpm kernel-debug-devel-2.6.32-754.23.1.el6.i686.rpm kernel-debuginfo-2.6.32-754.23.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-754.23.1.el6.i686.rpm kernel-devel-2.6.32-754.23.1.el6.i686.rpm kernel-headers-2.6.32-754.23.1.el6.i686.rpm perf-2.6.32-754.23.1.el6.i686.rpm perf-debuginfo-2.6.32-754.23.1.el6.i686.rpm python-perf-debuginfo-2.6.32-754.23.1.el6.i686.rpm
noarch: kernel-abi-whitelists-2.6.32-754.23.1.el6.noarch.rpm kernel-doc-2.6.32-754.23.1.el6.noarch.rpm kernel-firmware-2.6.32-754.23.1.el6.noarch.rpm
ppc64: kernel-2.6.32-754.23.1.el6.ppc64.rpm kernel-bootwrapper-2.6.32-754.23.1.el6.ppc64.rpm kernel-debug-2.6.32-754.23.1.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-754.23.1.el6.ppc64.rpm kernel-debug-devel-2.6.32-754.23.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-754.23.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-754.23.1.el6.ppc64.rpm kernel-devel-2.6.32-754.23.1.el6.ppc64.rpm kernel-headers-2.6.32-754.23.1.el6.ppc64.rpm perf-2.6.32-754.23.1.el6.ppc64.rpm perf-debuginfo-2.6.32-754.23.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-754.23.1.el6.ppc64.rpm
s390x: kernel-2.6.32-754.23.1.el6.s390x.rpm kernel-debug-2.6.32-754.23.1.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-754.23.1.el6.s390x.rpm kernel-debug-devel-2.6.32-754.23.1.el6.s390x.rpm kernel-debuginfo-2.6.32-754.23.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-754.23.1.el6.s390x.rpm kernel-devel-2.6.32-754.23.1.el6.s390x.rpm kernel-headers-2.6.32-754.23.1.el6.s390x.rpm kernel-kdump-2.6.32-754.23.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-754.23.1.el6.s390x.rpm kernel-kdump-devel-2.6.32-754.23.1.el6.s390x.rpm perf-2.6.32-754.23.1.el6.s390x.rpm perf-debuginfo-2.6.32-754.23.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-754.23.1.el6.s390x.rpm
x86_64: kernel-2.6.32-754.23.1.el6.x86_64.rpm kernel-debug-2.6.32-754.23.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-754.23.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-754.23.1.el6.i686.rpm kernel-debug-devel-2.6.32-754.23.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.23.1.el6.i686.rpm kernel-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-754.23.1.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-754.23.1.el6.x86_64.rpm kernel-devel-2.6.32-754.23.1.el6.x86_64.rpm kernel-headers-2.6.32-754.23.1.el6.x86_64.rpm perf-2.6.32-754.23.1.el6.x86_64.rpm perf-debuginfo-2.6.32-754.23.1.el6.i686.rpm perf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.23.1.el6.i686.rpm python-perf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
i386: kernel-debug-debuginfo-2.6.32-754.23.1.el6.i686.rpm kernel-debuginfo-2.6.32-754.23.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-754.23.1.el6.i686.rpm perf-debuginfo-2.6.32-754.23.1.el6.i686.rpm python-perf-2.6.32-754.23.1.el6.i686.rpm python-perf-debuginfo-2.6.32-754.23.1.el6.i686.rpm
ppc64: kernel-debug-debuginfo-2.6.32-754.23.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-754.23.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-754.23.1.el6.ppc64.rpm perf-debuginfo-2.6.32-754.23.1.el6.ppc64.rpm python-perf-2.6.32-754.23.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-754.23.1.el6.ppc64.rpm
s390x: kernel-debug-debuginfo-2.6.32-754.23.1.el6.s390x.rpm kernel-debuginfo-2.6.32-754.23.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-754.23.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-754.23.1.el6.s390x.rpm perf-debuginfo-2.6.32-754.23.1.el6.s390x.rpm python-perf-2.6.32-754.23.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-754.23.1.el6.s390x.rpm
x86_64: kernel-debug-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-754.23.1.el6.x86_64.rpm perf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm python-perf-2.6.32-754.23.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: kernel-2.6.32-754.23.1.el6.src.rpm
i386: kernel-2.6.32-754.23.1.el6.i686.rpm kernel-debug-2.6.32-754.23.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-754.23.1.el6.i686.rpm kernel-debug-devel-2.6.32-754.23.1.el6.i686.rpm kernel-debuginfo-2.6.32-754.23.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-754.23.1.el6.i686.rpm kernel-devel-2.6.32-754.23.1.el6.i686.rpm kernel-headers-2.6.32-754.23.1.el6.i686.rpm perf-2.6.32-754.23.1.el6.i686.rpm perf-debuginfo-2.6.32-754.23.1.el6.i686.rpm python-perf-debuginfo-2.6.32-754.23.1.el6.i686.rpm
noarch: kernel-abi-whitelists-2.6.32-754.23.1.el6.noarch.rpm kernel-doc-2.6.32-754.23.1.el6.noarch.rpm kernel-firmware-2.6.32-754.23.1.el6.noarch.rpm
x86_64: kernel-2.6.32-754.23.1.el6.x86_64.rpm kernel-debug-2.6.32-754.23.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-754.23.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-754.23.1.el6.i686.rpm kernel-debug-devel-2.6.32-754.23.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.23.1.el6.i686.rpm kernel-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-754.23.1.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-754.23.1.el6.x86_64.rpm kernel-devel-2.6.32-754.23.1.el6.x86_64.rpm kernel-headers-2.6.32-754.23.1.el6.x86_64.rpm perf-2.6.32-754.23.1.el6.x86_64.rpm perf-debuginfo-2.6.32-754.23.1.el6.i686.rpm perf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.23.1.el6.i686.rpm python-perf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
i386: kernel-debug-debuginfo-2.6.32-754.23.1.el6.i686.rpm kernel-debuginfo-2.6.32-754.23.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-754.23.1.el6.i686.rpm perf-debuginfo-2.6.32-754.23.1.el6.i686.rpm python-perf-2.6.32-754.23.1.el6.i686.rpm python-perf-debuginfo-2.6.32-754.23.1.el6.i686.rpm
x86_64: kernel-debug-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-754.23.1.el6.x86_64.rpm perf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm python-perf-2.6.32-754.23.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2019-14835 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/kernel-vhost
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBXYiPr9zjgjWX9erEAQjN1A/+IHOdg8Beicp8yr78sUumJ7+hE87hxu0f TCubCbjezezlvYlEfTcCz0nCF6HvcETrxNA6yj70lVLL6zc/ink1/EV7IaIis4f7 pQ5eO6pc8d0jm0x4k5y5Kjif0bxROUJeSvuI6p3nfhDZkXH5rswlfZC3/GlzVrpY CJWDWWYdcOlK6KYCai/AZTPVGL2qOvtIma7tbYfhXyyexk48S/mYIgwVKyH2MYG/ sYVoZQRuq9cT9Obl0y/O9LcG3RJ6+JAhC5+FvU3zcbndT+32SEeKKlmbSSEYuFmE SFRRWDiZX1uhElW/K7nYrRTN87bJZ0wgIOvXauQmWMwS1NAuelQIqOQ3NAXG8oYz A/wOPkILOHI352z8/Dm+p/Po6Ql/PUPZBT+GYmLv+Mju0pckg/7OLLqHqFUGwEey J0rSl9OaePNyOmUdPYOAOKPrwRnLHArG3kSKzLDnW2T1MQX0/51tDgasxptS1ekQ S8mvrKJoqc7Vlghx3jZ854/Uegx6J7eUlQmuSWvZGAM6sR9826TzpQHag2am1sUt JtAjh9Zv4f+C292ltjLRtp2zuKmYQNcDCl8NoustAi7SXvYcAYr5uSXDMc+BajIa MY2jtvyVIyGHpf4jkoDBtTLtmhIyhU+fs1MEF9SI0nvbveqMMzJFXXs6ExOy0OBI 1XpQhVd4g6E=hfEj -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . 7) - ppc64le, x86_64
- Description:
This is a kernel live patch module which can be loaded by the kpatch command line utility to modify the code of a running kernel
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201909-0695", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "manageone", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "6.5.1rc1.b060" }, { "model": "kernel", "scope": "lt", "trust": 1.0, "vendor": "linux", "version": "4.9.193" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.7" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.6" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.2" }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "manageone", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "6.5.rc2.b050" }, { "model": "h300e", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "kernel", "scope": "gte", "trust": 1.0, "vendor": "linux", "version": "4.14" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "h610s", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "service processor", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.2" }, { "model": "enterprise linux for real time", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.7" }, { "model": "virtualization", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "4.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "12.04" }, { "model": "h300s", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "kernel", "scope": "lt", "trust": 1.0, "vendor": "linux", "version": "4.4.193" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.4" }, { "model": "steelstore cloud integrated storage", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "kernel", "scope": "gte", "trust": 1.0, "vendor": "linux", "version": "2.6.34" }, { "model": "imanager neteco", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v600r009c10spc200" }, { "model": "manageone", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "6.5.1rc1.b080" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "14.04" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.3" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.6" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.6" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "aff a700s", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "8.0" }, { "model": "h500e", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.0" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "16.04" }, { "model": "kernel", "scope": "gte", "trust": 1.0, "vendor": "linux", "version": "5.2" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.5" }, { "model": "h500s", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "solidfire", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "imanager neteco", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v600r009c00" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "kernel", "scope": "lt", "trust": 1.0, "vendor": "linux", "version": "4.14.144" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "30" }, { "model": "manageone", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "6.5.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "18.04" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.6" }, { "model": "kernel", "scope": "gte", "trust": 1.0, "vendor": "linux", "version": "4.19" }, { "model": "openshift container platform", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "3.11" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "29" }, { "model": "imanager neteco 6000", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v600r008c20" }, { "model": "imanager neteco 6000", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v600r008c10spc300" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.7" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "10.0" }, { "model": "kernel", "scope": "lt", "trust": 1.0, "vendor": "linux", "version": "4.19.73" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.5" }, { "model": "h700e", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "leap", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "15.1" }, { "model": "h410c", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "kernel", "scope": "lt", "trust": 1.0, "vendor": "linux", "version": "5.2.15" }, { "model": "h410s", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "kernel", "scope": "gte", "trust": 1.0, "vendor": "linux", "version": "4.9" }, { "model": "data availability services", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "enterprise linux for real time", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8" }, { "model": "h700s", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "5.3" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.3" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.4" }, { "model": "kernel", "scope": "gte", "trust": 1.0, "vendor": "linux", "version": "4.4" }, { "model": "kernel", "scope": "lt", "trust": 1.0, "vendor": "linux", "version": "3.16.74" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "19.04" }, { "model": "leap", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "15.0" }, { "model": "virtualization host", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "4.0" }, { "model": "manageone", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "6.5.0.spc100.b210" }, { "model": "hci management node", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.6" } ], "sources": [ { "db": "NVD", "id": "CVE-2019-14835" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "154608" }, { "db": "PACKETSTORM", "id": "154565" }, { "db": "PACKETSTORM", "id": "154538" }, { "db": "PACKETSTORM", "id": "154563" }, { "db": "PACKETSTORM", "id": "154558" }, { "db": "PACKETSTORM", "id": "154540" } ], "trust": 0.6 }, "cve": "CVE-2019-14835", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2019-14835", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-146821", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2019-14835", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "secalert@redhat.com", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.6, "id": "CVE-2019-14835", "impactScore": 6.0, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-14835", "trust": 1.0, "value": "HIGH" }, { "author": "secalert@redhat.com", "id": "CVE-2019-14835", "trust": 1.0, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-146821", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-146821" }, { "db": "NVD", "id": "CVE-2019-14835" }, { "db": "NVD", "id": "CVE-2019-14835" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel\u0027s vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc. =========================================================================\nUbuntu Security Notice USN-4135-1\nSeptember 18, 2019\n\nlinux, linux-aws, linux-aws-hwe, linux-azure, linux-gcp,\nlinux-gke-4.15, linux-gke-5.0, linux-hwe, linux-kvm, linux-oem,\nlinux-oracle, linux-raspi2, linux-snapdragon vulnerabilities\n=========================================================================\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 19.04\n- Ubuntu 18.04 LTS\n- Ubuntu 16.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in the Linux kernel. (CVE-2019-14835)\n\nIt was discovered that the Linux kernel on PowerPC architectures did not\nproperly handle Facility Unavailable exceptions in some situations. A local\nattacker could use this to expose sensitive information. (CVE-2019-15030)\n\nIt was discovered that the Linux kernel on PowerPC architectures did not\nproperly handle exceptions on interrupts in some situations. A local\nattacker could use this to expose sensitive information. (CVE-2019-15031)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 19.04:\n linux-image-5.0.0-1016-aws 5.0.0-1016.18\n linux-image-5.0.0-1017-gcp 5.0.0-1017.17\n linux-image-5.0.0-1017-kvm 5.0.0-1017.18\n linux-image-5.0.0-1017-raspi2 5.0.0-1017.17\n linux-image-5.0.0-1020-azure 5.0.0-1020.21\n linux-image-5.0.0-1021-snapdragon 5.0.0-1021.22\n linux-image-5.0.0-29-generic 5.0.0-29.31\n linux-image-5.0.0-29-generic-lpae 5.0.0-29.31\n linux-image-5.0.0-29-lowlatency 5.0.0-29.31\n linux-image-aws 5.0.0.1016.17\n linux-image-azure 5.0.0.1020.19\n linux-image-gcp 5.0.0.1017.43\n linux-image-generic 5.0.0.29.30\n linux-image-generic-lpae 5.0.0.29.30\n linux-image-gke 5.0.0.1017.43\n linux-image-kvm 5.0.0.1017.17\n linux-image-lowlatency 5.0.0.29.30\n linux-image-raspi2 5.0.0.1017.14\n linux-image-snapdragon 5.0.0.1021.14\n linux-image-virtual 5.0.0.29.30\n\nUbuntu 18.04 LTS:\n linux-image-4.15.0-1025-oracle 4.15.0-1025.28\n linux-image-4.15.0-1044-gcp 4.15.0-1044.70\n linux-image-4.15.0-1044-gke 4.15.0-1044.46\n linux-image-4.15.0-1046-kvm 4.15.0-1046.46\n linux-image-4.15.0-1047-raspi2 4.15.0-1047.51\n linux-image-4.15.0-1050-aws 4.15.0-1050.52\n linux-image-4.15.0-1056-oem 4.15.0-1056.65\n linux-image-4.15.0-1064-snapdragon 4.15.0-1064.71\n linux-image-4.15.0-64-generic 4.15.0-64.73\n linux-image-4.15.0-64-generic-lpae 4.15.0-64.73\n linux-image-4.15.0-64-lowlatency 4.15.0-64.73\n linux-image-5.0.0-1017-gke 5.0.0-1017.17~18.04.1\n linux-image-5.0.0-1020-azure 5.0.0-1020.21~18.04.1\n linux-image-5.0.0-29-generic 5.0.0-29.31~18.04.1\n linux-image-5.0.0-29-generic-lpae 5.0.0-29.31~18.04.1\n linux-image-5.0.0-29-lowlatency 5.0.0-29.31~18.04.1\n linux-image-aws 4.15.0.1050.49\n linux-image-azure 5.0.0.1020.30\n linux-image-gcp 4.15.0.1044.70\n linux-image-generic 4.15.0.64.66\n linux-image-generic-hwe-18.04 5.0.0.29.86\n linux-image-generic-lpae 4.15.0.64.66\n linux-image-generic-lpae-hwe-18.04 5.0.0.29.86\n linux-image-gke 4.15.0.1044.47\n linux-image-gke-4.15 4.15.0.1044.47\n linux-image-gke-5.0 5.0.0.1017.7\n linux-image-kvm 4.15.0.1046.46\n linux-image-lowlatency 4.15.0.64.66\n linux-image-lowlatency-hwe-18.04 5.0.0.29.86\n linux-image-oem 4.15.0.1056.60\n linux-image-oracle 4.15.0.1025.28\n linux-image-powerpc-e500mc 4.15.0.64.66\n linux-image-powerpc-smp 4.15.0.64.66\n linux-image-powerpc64-emb 4.15.0.64.66\n linux-image-powerpc64-smp 4.15.0.64.66\n linux-image-raspi2 4.15.0.1047.45\n linux-image-snapdragon 4.15.0.1064.67\n linux-image-snapdragon-hwe-18.04 5.0.0.29.86\n linux-image-virtual 4.15.0.64.66\n linux-image-virtual-hwe-18.04 5.0.0.29.86\n\nUbuntu 16.04 LTS:\n linux-image-4.15.0-1025-oracle 4.15.0-1025.28~16.04.1\n linux-image-4.15.0-1044-gcp 4.15.0-1044.46\n linux-image-4.15.0-1050-aws 4.15.0-1050.52~16.04.1\n linux-image-4.15.0-1059-azure 4.15.0-1059.64\n linux-image-4.15.0-64-generic 4.15.0-64.73~16.04.1\n linux-image-4.15.0-64-generic-lpae 4.15.0-64.73~16.04.1\n linux-image-4.15.0-64-lowlatency 4.15.0-64.73~16.04.1\n linux-image-4.4.0-1058-kvm 4.4.0-1058.65\n linux-image-4.4.0-1094-aws 4.4.0-1094.105\n linux-image-4.4.0-1122-raspi2 4.4.0-1122.131\n linux-image-4.4.0-1126-snapdragon 4.4.0-1126.132\n linux-image-4.4.0-164-generic 4.4.0-164.192\n linux-image-4.4.0-164-generic-lpae 4.4.0-164.192\n linux-image-4.4.0-164-lowlatency 4.4.0-164.192\n linux-image-4.4.0-164-powerpc-e500mc 4.4.0-164.192\n linux-image-4.4.0-164-powerpc-smp 4.4.0-164.192\n linux-image-4.4.0-164-powerpc64-emb 4.4.0-164.192\n linux-image-4.4.0-164-powerpc64-smp 4.4.0-164.192\n linux-image-aws 4.4.0.1094.98\n linux-image-aws-hwe 4.15.0.1050.50\n linux-image-azure 4.15.0.1059.62\n linux-image-gcp 4.15.0.1044.58\n linux-image-generic 4.4.0.164.172\n linux-image-generic-hwe-16.04 4.15.0.64.84\n linux-image-generic-lpae 4.4.0.164.172\n linux-image-generic-lpae-hwe-16.04 4.15.0.64.84\n linux-image-gke 4.15.0.1044.58\n linux-image-kvm 4.4.0.1058.58\n linux-image-lowlatency 4.4.0.164.172\n linux-image-lowlatency-hwe-16.04 4.15.0.64.84\n linux-image-oem 4.15.0.64.84\n linux-image-oracle 4.15.0.1025.18\n linux-image-powerpc-e500mc 4.4.0.164.172\n linux-image-powerpc-smp 4.4.0.164.172\n linux-image-powerpc64-emb 4.4.0.164.172\n linux-image-powerpc64-smp 4.4.0.164.172\n linux-image-raspi2 4.4.0.1122.122\n linux-image-snapdragon 4.4.0.1126.118\n linux-image-virtual 4.4.0.164.172\n linux-image-virtual-hwe-16.04 4.15.0.64.84\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. \nUnless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\nlinux-powerpc), a standard system upgrade will automatically perform\nthis as well. 7.3) - noarch, x86_64\n\n3. \n(CVE-2019-14835)\n\n* kernel: hw: Spectre SWAPGS gadget vulnerability (CVE-2019-1125)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nBug Fix(es):\n\n* fs deadlock when a memory allocation waits on page writeback in NOFS\ncontext (BZ#1729105)\n\n* fragmented packets timing out (BZ#1729410)\n\n* kernel build: speed up debuginfo extraction (BZ#1731461)\n\n* use \"make -jN\" for modules_install (BZ#1735080)\n\n* shmem: consider shm_mnt as a long-term mount (BZ#1737375)\n\n* Backport TCP follow-up for small buffers (BZ#1739126)\n\n4. \n\n\nHere are the details from the Slackware 14.2 ChangeLog:\n+--------------------------+\npatches/packages/linux-4.4.199/*: Upgraded. \n These updates fix various bugs and security issues. \n Be sure to upgrade your initrd after upgrading the kernel packages. \n If you use lilo to boot your machine, be sure lilo.conf points to the correct\n kernel and initrd and run lilo as root to update the bootloader. \n If you use elilo to boot your machine, you should run eliloconfig to copy the\n kernel and initrd to the EFI System Partition. \n For more information, see:\n Fixed in 4.4.191:\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15118\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10906\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10905\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15117\n Fixed in 4.4.193:\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14835\n Fixed in 4.4.194:\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14816\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14814\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15505\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14821\n Fixed in 4.4.195:\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17053\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17052\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17056\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17055\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17054\n Fixed in 4.4.196:\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2215\n Fixed in 4.4.197:\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16746\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20976\n Fixed in 4.4.198:\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17075\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17133\n Fixed in 4.4.199:\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15098\n (* Security fix *)\n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated packages for Slackware 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-generic-4.4.199-i586-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-generic-smp-4.4.199_smp-i686-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-headers-4.4.199_smp-x86-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-huge-4.4.199-i586-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-huge-smp-4.4.199_smp-i686-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-modules-4.4.199-i586-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-modules-smp-4.4.199_smp-i686-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-source-4.4.199_smp-noarch-1.txz\n\nUpdated packages for Slackware x86_64 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.199/kernel-generic-4.4.199-x86_64-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.199/kernel-headers-4.4.199-x86-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.199/kernel-huge-4.4.199-x86_64-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.199/kernel-modules-4.4.199-x86_64-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.199/kernel-source-4.4.199-noarch-1.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 14.2 packages:\n\n0e523f42e759ecc2399f36e37672f110 kernel-generic-4.4.199-i586-1.txz\nee6451f5362008b46fee2e08e3077b21 kernel-generic-smp-4.4.199_smp-i686-1.txz\na8338ef88f2e3ea9c74d564c36ccd420 kernel-headers-4.4.199_smp-x86-1.txz\ncd9e9c241e4eec2fba1dae658a28870e kernel-huge-4.4.199-i586-1.txz\n842030890a424023817d42a83a86a7f4 kernel-huge-smp-4.4.199_smp-i686-1.txz\n257db024bb4501548ac9118dbd2d9ae6 kernel-modules-4.4.199-i586-1.txz\n96377cbaf7bca55aaca70358c63151a7 kernel-modules-smp-4.4.199_smp-i686-1.txz\n0673e86466f9e624964d95107cf6712f kernel-source-4.4.199_smp-noarch-1.txz\n\nSlackware x86_64 14.2 packages:\n6d1ff428e7cad6caa8860acc402447a1 kernel-generic-4.4.199-x86_64-1.txz\ndadc091dc725b8227e0d1e35098d6416 kernel-headers-4.4.199-x86-1.txz\nf5f4c034203f44dd1513ad3504c42515 kernel-huge-4.4.199-x86_64-1.txz\na5337cd8b2ca80d4d93b9e9688e42b03 kernel-modules-4.4.199-x86_64-1.txz\n5dd6e46c04f37b97062dc9e52cc38add kernel-source-4.4.199-noarch-1.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the packages as root:\n# upgradepkg kernel-*.txz\n\nIf you are using an initrd, you\u0027ll need to rebuild it. \n\nFor a 32-bit SMP machine, use this command (substitute the appropriate\nkernel version if you are not running Slackware 14.2):\n# /usr/share/mkinitrd/mkinitrd_command_generator.sh -k 4.4.199-smp | bash\n\nFor a 64-bit machine, or a 32-bit uniprocessor machine, use this command\n(substitute the appropriate kernel version if you are not running\nSlackware 14.2):\n# /usr/share/mkinitrd/mkinitrd_command_generator.sh -k 4.4.199 | bash\n\nPlease note that \"uniprocessor\" has to do with the kernel you are running,\nnot with the CPU. Most systems should run the SMP kernel (if they can)\nregardless of the number of cores the CPU has. If you aren\u0027t sure which\nkernel you are running, run \"uname -a\". If you see SMP there, you are\nrunning the SMP kernel and should use the 4.4.199-smp version when running\nmkinitrd_command_generator. Note that this is only for 32-bit -- 64-bit\nsystems should always use 4.4.199 as the version. \n\nIf you are using lilo or elilo to boot the machine, you\u0027ll need to ensure\nthat the machine is properly prepared before rebooting. \n\nIf using LILO:\nBy default, lilo.conf contains an image= line that references a symlink\nthat always points to the correct kernel. No editing should be required\nunless your machine uses a custom lilo.conf. If that is the case, be sure\nthat the image= line references the correct kernel file. Either way,\nyou\u0027ll need to run \"lilo\" as root to reinstall the boot loader. \n\nIf using elilo:\nEnsure that the /boot/vmlinuz symlink is pointing to the kernel you wish\nto use, and then run eliloconfig to update the EFI System Partition. \n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list: |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message: |\n| |\n| unsubscribe slackware-security |\n| |\n| You will get a confirmation message back containing instructions to |\n| complete the process. Please do not reply to this email address. \n\nCVE-2019-14821\n\n Matt Delco reported a race condition in KVM\u0027s coalesced MMIO\n facility, which could lead to out-of-bounds access in the kernel. \n A local attacker permitted to access /dev/kvm could use this to\n cause a denial of service (memory corruption or crash) or possibly\n for privilege escalation. \n\nCVE-2019-14835\n\n Peter Pi of Tencent Blade Team discovered a missing bounds check\n in vhost_net, the network back-end driver for KVM hosts, leading\n to a buffer overflow when the host begins live migration of a VM. \n An attacker in control of a VM could use this to cause a denial of\n service (memory corruption or crash) or possibly for privilege\n escalation on the host. \n\nCVE-2019-15117\n\n Hui Peng and Mathias Payer reported a missing bounds check in the\n usb-audio driver\u0027s descriptor parsing code, leading to a buffer\n over-read. An attacker able to add USB devices could possibly use\n this to cause a denial of service (crash). \n\nCVE-2019-15118\n\n Hui Peng and Mathias Payer reported unbounded recursion in the\n usb-audio driver\u0027s descriptor parsing code, leading to a stack\n overflow. An attacker able to add USB devices could use this to\n cause a denial of service (memory corruption or crash) or possibly\n for privilege escalation. On the amd64 architecture, and on the\n arm64 architecture in buster, this is mitigated by a guard page\n on the kernel stack, so that it is only possible to cause a crash. \n\nCVE-2019-15902\n\n Brad Spengler reported that a backporting error reintroduced a\n spectre-v1 vulnerability in the ptrace subsystem in the\n ptrace_get_debugreg() function. \n\nFor the oldstable distribution (stretch), these problems have been fixed\nin version 4.9.189-3+deb9u1. \n\nFor the stable distribution (buster), these problems have been fixed in\nversion 4.19.67-2+deb10u1. \n\nFor the detailed security status of linux please refer to its security\ntracker page at:\nhttps://security-tracker.debian.org/tracker/linux\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n\niQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl2K5xlfFIAAAAAALgAo\naXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2\nNDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND\nz0Sj8xAAnBGWzlmy5RyQe8VCE3kkMpwmH/00I5IFpjTbAVvyHzKVYl96YbY1YuAP\nID++cBxBElWCQriwCESc5Um/BGpOMmTa3VlkXIVy6uHgwt1Hn+ZW/syFaGt0/brW\neKIecVQLyZaV7OOx4Q+J9H5WN1FNKoV3BCsfUFlRqNCUtYQ46X7pN+gyytW4KbZo\nAEbPkEdUhv2Z6ndq8Z/OJ5cyYms+OonEt08e2qcN0Ig+qRY9l3fgSn/X3tKQiuJj\njGKPkd0VYrFzfDKekcboIBZyegahReRe4k+V8I+o/acuQJGR1cV/qCGxboFFI2+s\nWeSUhaVixP+7HLXyRljFBdvXlAnx/IajEPG+RAVt6zZs1yK+8bVIhai5TarcwbF3\nDWQZvpAeLaKgIN4x7s7xDHNJzO9Ea9fhXm/9T1AoaO3wdN2zjOYHLG3YO4TF0PpF\nrYY9t17uNdAuCxPeQWCciDOiNQVbEmr3+al/78m2VZcBYEI2s1E9fgQJV21rRlv+\nfEavwX9OJg6GKcW9v6cyegyf4gfTvjyzIP/rcmn55hiQ9vjVNykkoNUES5Do6sTb\n/pSSRuUpJtEE+6LnnqbdD0E6l8SC6zgA/+Pu/7BrACxlk9bhYFmVaAwbPPEuRgrz\n3d87MB8FEHu4RDGSgomb849wuAXnEVDwM034VtURUSEAXVFQ0dY=Wqdv\n-----END PGP SIGNATURE-----\n. 8) - x86_64\n\n3. Description:\n\nThe kernel-rt packages provide the Real Time Linux Kernel, which enables\nfine-tuning for systems with extremely high determinism requirements. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Important: kernel security update\nAdvisory ID: RHSA-2019:2863-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2019:2863\nIssue date: 2019-09-23\nCVE Names: CVE-2019-14835\n====================================================================\n1. Summary:\n\nAn update for kernel is now available for Red Hat Enterprise Linux 6. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\n\n3. Description:\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system. \n(CVE-2019-14835)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1750727 - CVE-2019-14835 kernel: vhost-net: guest to host kernel escape during migration\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nkernel-2.6.32-754.23.1.el6.src.rpm\n\ni386:\nkernel-2.6.32-754.23.1.el6.i686.rpm\nkernel-debug-2.6.32-754.23.1.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-754.23.1.el6.i686.rpm\nkernel-debug-devel-2.6.32-754.23.1.el6.i686.rpm\nkernel-debuginfo-2.6.32-754.23.1.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-754.23.1.el6.i686.rpm\nkernel-devel-2.6.32-754.23.1.el6.i686.rpm\nkernel-headers-2.6.32-754.23.1.el6.i686.rpm\nperf-2.6.32-754.23.1.el6.i686.rpm\nperf-debuginfo-2.6.32-754.23.1.el6.i686.rpm\npython-perf-debuginfo-2.6.32-754.23.1.el6.i686.rpm\n\nnoarch:\nkernel-abi-whitelists-2.6.32-754.23.1.el6.noarch.rpm\nkernel-doc-2.6.32-754.23.1.el6.noarch.rpm\nkernel-firmware-2.6.32-754.23.1.el6.noarch.rpm\n\nx86_64:\nkernel-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-debug-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-debug-debuginfo-2.6.32-754.23.1.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-debug-devel-2.6.32-754.23.1.el6.i686.rpm\nkernel-debug-devel-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-754.23.1.el6.i686.rpm\nkernel-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-debuginfo-common-i686-2.6.32-754.23.1.el6.i686.rpm\nkernel-debuginfo-common-x86_64-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-devel-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-headers-2.6.32-754.23.1.el6.x86_64.rpm\nperf-2.6.32-754.23.1.el6.x86_64.rpm\nperf-debuginfo-2.6.32-754.23.1.el6.i686.rpm\nperf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-754.23.1.el6.i686.rpm\npython-perf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\ni386:\nkernel-debug-debuginfo-2.6.32-754.23.1.el6.i686.rpm\nkernel-debuginfo-2.6.32-754.23.1.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-754.23.1.el6.i686.rpm\nperf-debuginfo-2.6.32-754.23.1.el6.i686.rpm\npython-perf-2.6.32-754.23.1.el6.i686.rpm\npython-perf-debuginfo-2.6.32-754.23.1.el6.i686.rpm\n\nx86_64:\nkernel-debug-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-debuginfo-common-x86_64-2.6.32-754.23.1.el6.x86_64.rpm\nperf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\npython-perf-2.6.32-754.23.1.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nkernel-2.6.32-754.23.1.el6.src.rpm\n\nnoarch:\nkernel-abi-whitelists-2.6.32-754.23.1.el6.noarch.rpm\nkernel-doc-2.6.32-754.23.1.el6.noarch.rpm\nkernel-firmware-2.6.32-754.23.1.el6.noarch.rpm\n\nx86_64:\nkernel-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-debug-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-debug-debuginfo-2.6.32-754.23.1.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-debug-devel-2.6.32-754.23.1.el6.i686.rpm\nkernel-debug-devel-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-754.23.1.el6.i686.rpm\nkernel-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-debuginfo-common-i686-2.6.32-754.23.1.el6.i686.rpm\nkernel-debuginfo-common-x86_64-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-devel-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-headers-2.6.32-754.23.1.el6.x86_64.rpm\nperf-2.6.32-754.23.1.el6.x86_64.rpm\nperf-debuginfo-2.6.32-754.23.1.el6.i686.rpm\nperf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-754.23.1.el6.i686.rpm\npython-perf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nx86_64:\nkernel-debug-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-debuginfo-common-x86_64-2.6.32-754.23.1.el6.x86_64.rpm\nperf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\npython-perf-2.6.32-754.23.1.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nkernel-2.6.32-754.23.1.el6.src.rpm\n\ni386:\nkernel-2.6.32-754.23.1.el6.i686.rpm\nkernel-debug-2.6.32-754.23.1.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-754.23.1.el6.i686.rpm\nkernel-debug-devel-2.6.32-754.23.1.el6.i686.rpm\nkernel-debuginfo-2.6.32-754.23.1.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-754.23.1.el6.i686.rpm\nkernel-devel-2.6.32-754.23.1.el6.i686.rpm\nkernel-headers-2.6.32-754.23.1.el6.i686.rpm\nperf-2.6.32-754.23.1.el6.i686.rpm\nperf-debuginfo-2.6.32-754.23.1.el6.i686.rpm\npython-perf-debuginfo-2.6.32-754.23.1.el6.i686.rpm\n\nnoarch:\nkernel-abi-whitelists-2.6.32-754.23.1.el6.noarch.rpm\nkernel-doc-2.6.32-754.23.1.el6.noarch.rpm\nkernel-firmware-2.6.32-754.23.1.el6.noarch.rpm\n\nppc64:\nkernel-2.6.32-754.23.1.el6.ppc64.rpm\nkernel-bootwrapper-2.6.32-754.23.1.el6.ppc64.rpm\nkernel-debug-2.6.32-754.23.1.el6.ppc64.rpm\nkernel-debug-debuginfo-2.6.32-754.23.1.el6.ppc64.rpm\nkernel-debug-devel-2.6.32-754.23.1.el6.ppc64.rpm\nkernel-debuginfo-2.6.32-754.23.1.el6.ppc64.rpm\nkernel-debuginfo-common-ppc64-2.6.32-754.23.1.el6.ppc64.rpm\nkernel-devel-2.6.32-754.23.1.el6.ppc64.rpm\nkernel-headers-2.6.32-754.23.1.el6.ppc64.rpm\nperf-2.6.32-754.23.1.el6.ppc64.rpm\nperf-debuginfo-2.6.32-754.23.1.el6.ppc64.rpm\npython-perf-debuginfo-2.6.32-754.23.1.el6.ppc64.rpm\n\ns390x:\nkernel-2.6.32-754.23.1.el6.s390x.rpm\nkernel-debug-2.6.32-754.23.1.el6.s390x.rpm\nkernel-debug-debuginfo-2.6.32-754.23.1.el6.s390x.rpm\nkernel-debug-devel-2.6.32-754.23.1.el6.s390x.rpm\nkernel-debuginfo-2.6.32-754.23.1.el6.s390x.rpm\nkernel-debuginfo-common-s390x-2.6.32-754.23.1.el6.s390x.rpm\nkernel-devel-2.6.32-754.23.1.el6.s390x.rpm\nkernel-headers-2.6.32-754.23.1.el6.s390x.rpm\nkernel-kdump-2.6.32-754.23.1.el6.s390x.rpm\nkernel-kdump-debuginfo-2.6.32-754.23.1.el6.s390x.rpm\nkernel-kdump-devel-2.6.32-754.23.1.el6.s390x.rpm\nperf-2.6.32-754.23.1.el6.s390x.rpm\nperf-debuginfo-2.6.32-754.23.1.el6.s390x.rpm\npython-perf-debuginfo-2.6.32-754.23.1.el6.s390x.rpm\n\nx86_64:\nkernel-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-debug-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-debug-debuginfo-2.6.32-754.23.1.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-debug-devel-2.6.32-754.23.1.el6.i686.rpm\nkernel-debug-devel-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-754.23.1.el6.i686.rpm\nkernel-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-debuginfo-common-i686-2.6.32-754.23.1.el6.i686.rpm\nkernel-debuginfo-common-x86_64-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-devel-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-headers-2.6.32-754.23.1.el6.x86_64.rpm\nperf-2.6.32-754.23.1.el6.x86_64.rpm\nperf-debuginfo-2.6.32-754.23.1.el6.i686.rpm\nperf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-754.23.1.el6.i686.rpm\npython-perf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\ni386:\nkernel-debug-debuginfo-2.6.32-754.23.1.el6.i686.rpm\nkernel-debuginfo-2.6.32-754.23.1.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-754.23.1.el6.i686.rpm\nperf-debuginfo-2.6.32-754.23.1.el6.i686.rpm\npython-perf-2.6.32-754.23.1.el6.i686.rpm\npython-perf-debuginfo-2.6.32-754.23.1.el6.i686.rpm\n\nppc64:\nkernel-debug-debuginfo-2.6.32-754.23.1.el6.ppc64.rpm\nkernel-debuginfo-2.6.32-754.23.1.el6.ppc64.rpm\nkernel-debuginfo-common-ppc64-2.6.32-754.23.1.el6.ppc64.rpm\nperf-debuginfo-2.6.32-754.23.1.el6.ppc64.rpm\npython-perf-2.6.32-754.23.1.el6.ppc64.rpm\npython-perf-debuginfo-2.6.32-754.23.1.el6.ppc64.rpm\n\ns390x:\nkernel-debug-debuginfo-2.6.32-754.23.1.el6.s390x.rpm\nkernel-debuginfo-2.6.32-754.23.1.el6.s390x.rpm\nkernel-debuginfo-common-s390x-2.6.32-754.23.1.el6.s390x.rpm\nkernel-kdump-debuginfo-2.6.32-754.23.1.el6.s390x.rpm\nperf-debuginfo-2.6.32-754.23.1.el6.s390x.rpm\npython-perf-2.6.32-754.23.1.el6.s390x.rpm\npython-perf-debuginfo-2.6.32-754.23.1.el6.s390x.rpm\n\nx86_64:\nkernel-debug-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-debuginfo-common-x86_64-2.6.32-754.23.1.el6.x86_64.rpm\nperf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\npython-perf-2.6.32-754.23.1.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nkernel-2.6.32-754.23.1.el6.src.rpm\n\ni386:\nkernel-2.6.32-754.23.1.el6.i686.rpm\nkernel-debug-2.6.32-754.23.1.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-754.23.1.el6.i686.rpm\nkernel-debug-devel-2.6.32-754.23.1.el6.i686.rpm\nkernel-debuginfo-2.6.32-754.23.1.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-754.23.1.el6.i686.rpm\nkernel-devel-2.6.32-754.23.1.el6.i686.rpm\nkernel-headers-2.6.32-754.23.1.el6.i686.rpm\nperf-2.6.32-754.23.1.el6.i686.rpm\nperf-debuginfo-2.6.32-754.23.1.el6.i686.rpm\npython-perf-debuginfo-2.6.32-754.23.1.el6.i686.rpm\n\nnoarch:\nkernel-abi-whitelists-2.6.32-754.23.1.el6.noarch.rpm\nkernel-doc-2.6.32-754.23.1.el6.noarch.rpm\nkernel-firmware-2.6.32-754.23.1.el6.noarch.rpm\n\nx86_64:\nkernel-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-debug-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-debug-debuginfo-2.6.32-754.23.1.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-debug-devel-2.6.32-754.23.1.el6.i686.rpm\nkernel-debug-devel-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-754.23.1.el6.i686.rpm\nkernel-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-debuginfo-common-i686-2.6.32-754.23.1.el6.i686.rpm\nkernel-debuginfo-common-x86_64-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-devel-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-headers-2.6.32-754.23.1.el6.x86_64.rpm\nperf-2.6.32-754.23.1.el6.x86_64.rpm\nperf-debuginfo-2.6.32-754.23.1.el6.i686.rpm\nperf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-754.23.1.el6.i686.rpm\npython-perf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\ni386:\nkernel-debug-debuginfo-2.6.32-754.23.1.el6.i686.rpm\nkernel-debuginfo-2.6.32-754.23.1.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-754.23.1.el6.i686.rpm\nperf-debuginfo-2.6.32-754.23.1.el6.i686.rpm\npython-perf-2.6.32-754.23.1.el6.i686.rpm\npython-perf-debuginfo-2.6.32-754.23.1.el6.i686.rpm\n\nx86_64:\nkernel-debug-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\nkernel-debuginfo-common-x86_64-2.6.32-754.23.1.el6.x86_64.rpm\nperf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\npython-perf-2.6.32-754.23.1.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-754.23.1.el6.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2019-14835\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/security/vulnerabilities/kernel-vhost\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2019 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\n1XpQhVd4g6E=hfEj\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. 7) - ppc64le, x86_64\n\n3. Description:\n\nThis is a kernel live patch module which can be loaded by the kpatch\ncommand line utility to modify the code of a running kernel", "sources": [ { "db": "NVD", "id": "CVE-2019-14835" }, { "db": "VULHUB", "id": "VHN-146821" }, { "db": "PACKETSTORM", "id": "154514" }, { "db": "PACKETSTORM", "id": "154608" }, { "db": "PACKETSTORM", "id": "154565" }, { "db": "PACKETSTORM", "id": "155212" }, { "db": "PACKETSTORM", "id": "154606" }, { "db": "PACKETSTORM", "id": "154538" }, { "db": "PACKETSTORM", "id": "154563" }, { "db": "PACKETSTORM", "id": "154558" }, { "db": "PACKETSTORM", "id": "154540" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-14835", "trust": 2.0 }, { "db": "PACKETSTORM", "id": "155212", "trust": 1.2 }, { "db": "PACKETSTORM", "id": "154951", "trust": 1.1 }, { "db": "PACKETSTORM", "id": "154572", "trust": 1.1 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2019/10/03/1", "trust": 1.1 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2019/10/09/7", "trust": 1.1 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2019/09/24/1", "trust": 1.1 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2019/10/09/3", "trust": 1.1 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2019/09/17/1", "trust": 1.1 }, { "db": "PACKETSTORM", "id": "154538", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "154514", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "154563", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "154540", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "154565", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "154558", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "154539", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154513", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154570", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154602", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154562", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154566", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154564", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154541", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154585", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154659", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154569", "trust": 0.1 }, { "db": "CNNVD", "id": "CNNVD-201909-807", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-146821", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154608", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154606", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-146821" }, { "db": "PACKETSTORM", "id": "154514" }, { "db": "PACKETSTORM", "id": "154608" }, { "db": "PACKETSTORM", "id": "154565" }, { "db": "PACKETSTORM", "id": "155212" }, { "db": "PACKETSTORM", "id": "154606" }, { "db": "PACKETSTORM", "id": "154538" }, { "db": "PACKETSTORM", "id": "154563" }, { "db": "PACKETSTORM", "id": "154558" }, { "db": "PACKETSTORM", "id": "154540" }, { "db": "NVD", "id": "CVE-2019-14835" } ] }, "id": "VAR-201909-0695", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-146821" } ], "trust": 0.40555555 }, "last_update_date": "2024-09-19T21:55:31.365000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-146821" }, { "db": "NVD", "id": "CVE-2019-14835" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2019:2828" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2019:2830" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2019:2854" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2019:2863" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2019:2866" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2019:2900" }, { "trust": 1.1, "url": "https://seclists.org/bugtraq/2019/sep/41" }, { "trust": 1.1, "url": "https://seclists.org/bugtraq/2019/nov/11" }, { "trust": 1.1, "url": "https://www.debian.org/security/2019/dsa-4531" }, { "trust": 1.1, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/yw3qnmpenpfegvtofpsnobl7jeijs25p/" }, { "trust": 1.1, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/kqfy6jyfiq2vfq7qcsxpwtul5zdncjl5/" }, { "trust": 1.1, "url": "https://access.redhat.com/errata/rhba-2019:2824" }, { "trust": 1.1, "url": "https://access.redhat.com/errata/rhsa-2019:2827" }, { "trust": 1.1, "url": "https://access.redhat.com/errata/rhsa-2019:2829" }, { "trust": 1.1, "url": "https://access.redhat.com/errata/rhsa-2019:2862" }, { "trust": 1.1, "url": "https://access.redhat.com/errata/rhsa-2019:2864" }, { "trust": 1.1, "url": "https://access.redhat.com/errata/rhsa-2019:2865" }, { "trust": 1.1, "url": "https://access.redhat.com/errata/rhsa-2019:2867" }, { "trust": 1.1, "url": "https://access.redhat.com/errata/rhsa-2019:2869" }, { "trust": 1.1, "url": "https://access.redhat.com/errata/rhsa-2019:2889" }, { "trust": 1.1, "url": "https://access.redhat.com/errata/rhsa-2019:2899" }, { "trust": 1.1, "url": "https://access.redhat.com/errata/rhsa-2019:2901" }, { "trust": 1.1, "url": "https://access.redhat.com/errata/rhsa-2019:2924" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/4135-1/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/4135-2/" }, { "trust": 1.1, "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html" }, { "trust": 1.1, "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html" }, { "trust": 1.1, "url": "http://www.openwall.com/lists/oss-security/2019/09/24/1" }, { "trust": 1.1, "url": "http://www.openwall.com/lists/oss-security/2019/10/03/1" }, { "trust": 1.1, "url": "http://www.openwall.com/lists/oss-security/2019/10/09/3" }, { "trust": 1.1, "url": "http://www.openwall.com/lists/oss-security/2019/10/09/7" }, { "trust": 1.1, "url": "http://packetstormsecurity.com/files/154572/kernel-live-patch-security-notice-lsn-0056-1.html" }, { "trust": 1.1, "url": "http://packetstormsecurity.com/files/154951/kernel-live-patch-security-notice-lsn-0058-1.html" }, { "trust": 1.1, "url": "http://packetstormsecurity.com/files/155212/slackware-security-advisory-slackware-14.2-kernel-updates.html" }, { "trust": 1.1, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-qemu-en" }, { "trust": 1.1, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=cve-2019-14835" }, { "trust": 1.1, "url": "https://security.netapp.com/advisory/ntap-20191031-0005/" }, { "trust": 1.1, "url": "https://www.openwall.com/lists/oss-security/2019/09/17/1" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14835" }, { "trust": 0.6, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.6, "url": "https://access.redhat.com/security/vulnerabilities/kernel-vhost" }, { "trust": 0.6, "url": "https://access.redhat.com/security/cve/cve-2019-14835" }, { "trust": 0.6, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.6, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.6, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.6, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.6, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15118" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14821" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15117" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-hwe/5.0.0-29.31~18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1122.131" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-kvm/5.0.0-1017.18" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15030" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1059.64" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1044.46" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp/5.0.0-1017.17" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi2/5.0.0-1017.17" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/5.0.0-29.31" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1094.105" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws-hwe/4.15.0-1050.52~16.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gke-4.15/4.15.0-1044.46" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1047.51" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1050.52" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/4.15.0-64.73" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1025.28~16.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure/5.0.0-1020.21~18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-snapdragon/5.0.0-1021.22" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/5.0.0-1016.18" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1058.65" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1126.132" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oem/4.15.0-1056.65" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1046.46" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gke-5.0/5.0.0-1017.17~18.04.1" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4135-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1025.28" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1044.70" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/4.4.0-164.192" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-snapdragon/4.15.0-1064.71" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15031" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure/5.0.0-1020.21" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-64.73~16.04.1" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-1125" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-1125" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/4329821" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-14835" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-2215" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-17054" }, { "trust": 0.1, "url": "http://slackware.com" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-16746" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17055" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-17075" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-17053" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-10906" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-10906" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-20976" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-17052" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-15117" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-17133" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-14816" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15505" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-15098" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-16746" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17054" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2215" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-15118" }, { "trust": 0.1, "url": "http://slackware.com/gpg-key" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-10905" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17056" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-10905" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14816" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-3900" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-17056" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-14821" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-10638" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15098" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17075" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17053" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3900" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10638" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-17055" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-20976" }, { "trust": 0.1, "url": "http://osuosl.org)" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-14814" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17133" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-15505" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14814" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17052" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://security-tracker.debian.org/tracker/linux" }, { "trust": 0.1, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15902" } ], "sources": [ { "db": "VULHUB", "id": "VHN-146821" }, { "db": "PACKETSTORM", "id": "154514" }, { "db": "PACKETSTORM", "id": "154608" }, { "db": "PACKETSTORM", "id": "154565" }, { "db": "PACKETSTORM", "id": "155212" }, { "db": "PACKETSTORM", "id": "154606" }, { "db": "PACKETSTORM", "id": "154538" }, { "db": "PACKETSTORM", "id": "154563" }, { "db": "PACKETSTORM", "id": "154558" }, { "db": "PACKETSTORM", "id": "154540" }, { "db": "NVD", "id": "CVE-2019-14835" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-146821" }, { "db": "PACKETSTORM", "id": "154514" }, { "db": "PACKETSTORM", "id": "154608" }, { "db": "PACKETSTORM", "id": "154565" }, { "db": "PACKETSTORM", "id": "155212" }, { "db": "PACKETSTORM", "id": "154606" }, { "db": "PACKETSTORM", "id": "154538" }, { "db": "PACKETSTORM", "id": "154563" }, { "db": "PACKETSTORM", "id": "154558" }, { "db": "PACKETSTORM", "id": "154540" }, { "db": "NVD", "id": "CVE-2019-14835" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-09-17T00:00:00", "db": "VULHUB", "id": "VHN-146821" }, { "date": "2019-09-18T21:22:40", "db": "PACKETSTORM", "id": "154514" }, { "date": "2019-09-25T18:06:56", "db": "PACKETSTORM", "id": "154608" }, { "date": "2019-09-23T18:26:18", "db": "PACKETSTORM", "id": "154565" }, { "date": "2019-11-08T15:37:19", "db": "PACKETSTORM", "id": "155212" }, { "date": "2019-09-25T18:06:37", "db": "PACKETSTORM", "id": "154606" }, { "date": "2019-09-20T14:57:38", "db": "PACKETSTORM", "id": "154538" }, { "date": "2019-09-23T18:25:56", "db": "PACKETSTORM", "id": "154563" }, { "date": "2019-09-21T18:10:56", "db": "PACKETSTORM", "id": "154558" }, { "date": "2019-09-20T14:57:53", "db": "PACKETSTORM", "id": "154540" }, { "date": "2019-09-17T16:15:10.980000", "db": "NVD", "id": "CVE-2019-14835" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-12T00:00:00", "db": "VULHUB", "id": "VHN-146821" }, { "date": "2023-12-15T15:29:09.587000", "db": "NVD", "id": "CVE-2019-14835" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "PACKETSTORM", "id": "154514" } ], "trust": 0.1 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ubuntu Security Notice USN-4135-1", "sources": [ { "db": "PACKETSTORM", "id": "154514" } ], "trust": 0.1 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "overflow", "sources": [ { "db": "PACKETSTORM", "id": "154608" }, { "db": "PACKETSTORM", "id": "154565" }, { "db": "PACKETSTORM", "id": "154538" }, { "db": "PACKETSTORM", "id": "154563" }, { "db": "PACKETSTORM", "id": "154558" }, { "db": "PACKETSTORM", "id": "154540" } ], "trust": 0.6 } }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.