Red Hat Security Advisory 2020-3432-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability.
eb5edce74a1749a56db1e9936abec970445773d566c667d7144b25ff983f1df7
Red Hat Security Advisory 2020-3389-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a buffer overflow vulnerability.
e7d3267351e5cee06e04f040f56a24428c72eb593cf5631e459fc408ed93d894
Red Hat Security Advisory 2020-3232-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability.
e4b94113a05481107001d2bc361b6560e85155895a90fe481d88a7d4d3f5997e
Red Hat Security Advisory 2020-3226-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability.
85d74ca6ef2400b3be8a65332f226c9d5ad357ab0c9404c01d579c8327cc85fe
Red Hat Security Advisory 2020-3224-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability.
8c22a744cba36a85e223e41ce8e4d96062e9fca156ef9b6f44f8e416cd242a33
Red Hat Security Advisory 2020-3222-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, bypass, denial of service, and use-after-free vulnerabilities.
7aa836b0e3a02a3fdd2ce96dcc6a7c3a433395ad7ca4206c09f9f8ca74a94cd4
Red Hat Security Advisory 2020-3221-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow and use-after-free vulnerabilities.
f96eaa6638fcefbc1f8f05191fd3250224ddd190e215cab332fb0e2a9b2f1ff3
Red Hat Security Advisory 2020-3220-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow and use-after-free vulnerabilities.
0f38fe158ce7c9bdae202f95f3ea99755f8cb21f1ac198f18922ca242bd33254
Red Hat Security Advisory 2020-3041-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow and denial of service vulnerabilities.
69e759a3e8224b3a10c02bfe97a315dd059a829ad655f0333f8390a90bc36496
Red Hat Security Advisory 2020-3016-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, denial of service, information leakage, and use-after-free vulnerabilities.
a10bc866d2c38dcfce0739a6de5bb2135494bc2328b3814904d638e5ad07e6b3
Red Hat Security Advisory 2020-3010-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, denial of service, information leakage, and use-after-free vulnerabilities.
7a272eb0c7fa5b45f39ca71feec546b3249fc6448f3d63379ae6561c1203c4c9
Red Hat Security Advisory 2020-2832-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow and denial of service vulnerabilities.
338fe322c1a197f052ee79ac09f7c53bdd1eebc848d284bd5e3a82ccdf5c97a2
Ubuntu Security Notice 4392-1 - It was discovered that the Marvell WiFi-Ex Driver in the Linux kernel did not properly validate status lengths in messages received from an access point, leading to a buffer overflow. A physically proximate attacker controlling an access point could use this to construct messages that could possibly result in arbitrary code execution. It was discovered that memory contents previously stored in microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel client and Xeon E3 processors may be briefly exposed to processes on the same or different processor cores. A local attacker could use this to expose sensitive information. Various other issues were also addressed.
a9845b95b2be0fccbe823366e518cf239b87cde96d4347530b55da617eeaf0ce
Ubuntu Security Notice 4393-1 - It was discovered that the Marvell WiFi-Ex Driver in the Linux kernel did not properly validate status lengths in messages received from an access point, leading to a buffer overflow. A physically proximate attacker controlling an access point could use this to construct messages that could possibly result in arbitrary code execution. It was discovered that memory contents previously stored in microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel client and Xeon E3 processors may be briefly exposed to processes on the same or different processor cores. A local attacker could use this to expose sensitive information. Various other issues were also addressed.
d67938a188343bd47c630ca6e60398865571efabd19edc8b47139693334158f3