On 1st May 2019, the Linux kernel was updated to receive the patch. As a result, the kernel became vulnerable to the flaw. The update has been released by the Linux vendor Red Hat. In order to apply it, the system must have the Red Hat Enterprise Linux 7.0 or later version. There is one more way to patch the flaw. The system can upgrade to the Red Hat Enterprise Linux 7.1. Red Hat has also released an SRU (Software Readily Available) patch for Red Hat Enterprise Linux 6. Red Hat Enterprise Linux 5 users have the option to update their systems to Red Hat Enterprise Linux 7.

What to do if your Linux system is affected? VDB-211029 and CVE-2019-11085 are two vulnerabilities that can be exploited by a malicious user to cause a memory leak. This issue may lead to remote code execution. If you want to protect your system from this flaw, you must patch it immediately.

VDB-211029

VDB-211029 is a vulnerability which can be exploited by a malicious user to cause memory leak. This flaw may lead to remote code execution. The vulnerability is based on the use-after-free vulnerability (CVE-2019-11085).

VDB-211029: Critical Vulnerability

The vulnerability CVE-2019-11085 is also quite critical. It can be exploited by a malicious user to cause a memory leak. This issue may lead to remote code execution. If you want to protect your system from this flaw, you must patch it immediately.

What to do if your Linux system is affected? VDB-211029 and CVE-2019-11085 are two vulnerabilities that can be exploited by a malicious user to cause a memory leak. This issue may lead to remote code execution. If you want to protect your system from this flaw, you must patch it immediately.

Timeline

Published on: 10/17/2022 09:15:00 UTC
Last modified on: 10/19/2022 05:22:00 UTC

References