Red Hat Enterprise Linux 7 and CentOS 7 receive important kernel security update

Red Hat Product Security was marked as having "significant" security implications of the new Linux kernel security updates in this patch two vulnerabilities that CVE-2019-14821 , found in the Linux kernel's KVM hypervisor in the ring buffer MMIO and CVE-2019-15239 beyond the scope of the problem of memory access, the vulnerability may allow a local attacker to trigger multiple use-after-free conditions, which could cause a kernel panic or potential privilege escalation.

In addition, the kernel update addresses some errors, including NVMe driver lost SCSI VPD information which destroyed InfoScale, check_preempt_wakeup + NULL pointer 0x109 at dereferenced, pick_next_task_rt panic, adapter reset leads "detected by the Tx unit linked since "error, load balancing on the VF interrupt LAG configuration, security issues on the encryption vmx driver, XFS pending acquisition xfs_buf semaphore, a single CPU virtual machine during open_posix_testsuite suspended, and so on.

CentOS 7.6 source code under the installation Emacs 26.3

It urged users to update their systems immediately

The new Linux kernel security update applies to the Red Hat Enterprise Linux Server 7, Red Hat Enterprise Linux Server-AUS 7.7, Red Hat Enterprise Linux Workstation 7, Red Hat Enterprise Linux Desktop 7, applies to IBM z Systems Red Hat Enterprise Linux 7 of 7 for Power of Red Hat Enterprise Linux, big endian 7, suitable for scientific computing Red Hat Enterprise Linux 7, Red Hat Enterprise Linux EUS compute Node 7.7 and Red Hat Enterprise Linux for Power, little endian 7 series operating system.

In addition, it will also affect Red Hat Virtualization Host 4, Red Hat Enterprise Linux Server - TUS 7.7, Red Hat Enterprise Linux Server (for IBM Power LE) - SAP Solutions Update Service 7.7, Red Hat Enterprise Linux Server - SAP Solutions 7.7 the update service and CentOS Linux 7 system. It urged users to install the update to kernel-3.10.0-1062.7.1.el7.x86_64 as soon as possible, and to restart the computer after a successful application of the new kernel version.

Guess you like

Origin www.linuxidc.com/Linux/2019-12/161655.htm