First published: Tue Oct 06 2020(Updated: )
The kernel packages contain the Linux kernel, the core of any Linux operating system.<br>Security Fix(es):<br><li> kernel: Count overflow in FUSE request leading to use-after-free issues. (CVE-2019-11487)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Bug Fix(es):<br><li> NULL sdev dereference race in atapi_qc_complete() (BZ#1876296)</li>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
redhat/kernel | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
redhat/kernel-abi-whitelists | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
redhat/kernel-debug | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
redhat/kernel-debug-devel | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
redhat/kernel-debug-devel | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
redhat/kernel-debuginfo | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
redhat/kernel-debuginfo | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
redhat/kernel-debuginfo-common-i686 | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
redhat/kernel-devel | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
redhat/kernel-doc | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
redhat/kernel-firmware | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
redhat/kernel-headers | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
redhat/perf | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
redhat/perf-debuginfo | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
redhat/perf-debuginfo | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
redhat/python-perf | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
redhat/python-perf-debuginfo | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
redhat/python-perf-debuginfo | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
redhat/kernel-debug | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
redhat/kernel-devel | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
redhat/kernel-headers | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
redhat/perf | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
redhat/python-perf | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
redhat/kernel-debuginfo-common-s390x | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
redhat/kernel-kdump | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
redhat/kernel-kdump-debuginfo | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
redhat/kernel-kdump-devel | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
redhat/kernel-bootwrapper | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
redhat/kernel-debuginfo-common-ppc64 | <2.6.32-754.35.1.el6 | 2.6.32-754.35.1.el6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2020:4182 is classified as critical due to the potential for use-after-free vulnerabilities in the Linux kernel.
To fix RHSA-2020:4182, upgrade the kernel packages to version 2.6.32-754.35.1.el6 or later.
RHSA-2020:4182 affects systems running the Red Hat Enterprise Linux 6 kernel prior to version 2.6.32-754.35.1.el6.
RHSA-2020:4182 addresses a use-after-free vulnerability caused by a count overflow in FUSE requests, identified by CVE-2019-11487.
There are no known workarounds for RHSA-2020:4182, and users are advised to apply the security update as soon as possible.