Red Hat Security Advisory 2018-3643-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include an integer overflow vulnerability.
173945eca7ad527001ac027c9e4312830edb314be2e89234410ad71891918584
Red Hat Security Advisory 2018-3591-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include an integer overflow vulnerability.
ccf8060e03ef67ab708802c8654d1b6d77da8af66f7e306750e5d6334f9a4f25
Red Hat Security Advisory 2018-3590-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include denial of service and use-after-free vulnerabilities.
e1f32d161373ab4335bdb583d19868b2299507b80221f4b698d47f09a7185dc2
Red Hat Security Advisory 2018-3540-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include denial of service and use-after-free vulnerabilities.
633aabe29b1e0f5d6bf768e3c3ce4393d827ebe23a55fe636f36ccbc25c9b3d7
Red Hat Security Advisory 2018-3586-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include denial of service and use-after-free vulnerabilities.
e0009f6e82725aa1e1293a06230a2d8f2162605ab1319eabab34e2054abbd3fd
Red Hat Security Advisory 2018-2925-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include bypass, denial of service, and use-after-free vulnerabilities.
b291292e8b9a806490b72134ba9b66f2e88a7525f3e9edbd3721a391565fdc2c
Red Hat Security Advisory 2018-2933-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include denial of service and use-after-free vulnerabilities.
da44b65ca026d77d9fe69150ad4681fb84a6bfef262200d65ea41479d52319b6
Red Hat Security Advisory 2018-2924-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include denial of service and use-after-free vulnerabilities.
59027949276915cbfb6cb27563c954a32cb80ddf634724ff050f8bc89143be4d
Red Hat Security Advisory 2018-2846-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a denial of service vulnerability.
6b69a234351c3cd858bbcf22b4fc8bde49a9507c111b8b44436cd6b395d2d1e1
Ubuntu Security Notice 3779-1 - It was discovered that an integer overflow vulnerability existed in the Linux kernel when loading an executable to run. A local attacker could use this to gain administrative privileges. It was discovered that a stack-based buffer overflow existed in the iSCSI target implementation of the Linux kernel. A remote attacker could use this to cause a denial of service.
2842029570cb4ccce9acc40a082a95ea8e9b0fcd7b58823bb3b51d8bfa1fe13a
Ubuntu Security Notice 3775-2 - USN-3775-1 fixed vulnerabilities in the Linux kernel for Ubuntu 14.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement kernel from Ubuntu 14.04 LTS for Ubuntu 12.04 ESM. It was discovered that the paravirtualization implementation in the Linux kernel did not properly handle some indirect calls, reducing the effectiveness of Spectre v2 mitigations for paravirtual guests. A local attacker could use this to expose sensitive information. Various other issues were also addressed.
090ca3870bdaa06b0dc62fb8798c12a1ee9c47b196699f9a0203a88188b067b6
Ubuntu Security Notice 3775-1 - It was discovered that the paravirtualization implementation in the Linux kernel did not properly handle some indirect calls, reducing the effectiveness of Spectre v2 mitigations for paravirtual guests. A local attacker could use this to expose sensitive information. It was discovered that microprocessors utilizing speculative execution and prediction of return addresses via Return Stack Buffer may allow unauthorized memory reads via sidechannel attacks. An attacker could use this to expose sensitive information. Various other issues were also addressed.
0671659edb76aef4d781ef70d4b7152b4ea5931d8e8225a5b32f8742a0383ece
Linux suffers from an integer overflow vulnerability in create_elf_tables(). Multiple exploits provided.
96f76be0c1dab33a40b6145fd293ceab661f631350fcf639a1e4bdb1faedbb92
Red Hat Security Advisory 2018-2763-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include an integer overflow.
8a8017a298354d783ca92b38f20cd161f990b790585b9243060757f8dec68608
Red Hat Security Advisory 2018-2748-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include an integer overflow.
2c686a3c397b11c1f30cf0c34ac0e021005e1fa7cec161de45165b0604820843