ALT-PU-2019-2141-1
Package kernel-image-un-def updated to version 5.1.15-alt1 for branch sisyphus in task 233162.
Closed vulnerabilities
BDU:2019-02507
Уязвимость компонента arch/powerpc/mm/mmu_context_book3s64.c ядра операционной системы Linux, позволяющая нарушителю получить доступ к содержимому памяти или вызвать повреждение памяти других процессов в системе
Modified: 2024-11-21
CVE-2019-12615
An issue was discovered in get_vdev_port_node_info in arch/sparc/kernel/mdesc.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup_const of node_info->vdev_port.name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).
- http://www.securityfocus.com/bid/108549
- https://git.kernel.org/pub/scm/linux/kernel/git/davem/sparc.git/commit/?id=80caf43549e7e41a695c6d1e11066286538b336f
- https://security.netapp.com/advisory/ntap-20190710-0002/
- https://support.f5.com/csp/article/K60924046
- https://support.f5.com/csp/article/K60924046?utm_source=f5support&%3Butm_medium=RSS
- https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg2014901.html
- http://www.securityfocus.com/bid/108549
- https://git.kernel.org/pub/scm/linux/kernel/git/davem/sparc.git/commit/?id=80caf43549e7e41a695c6d1e11066286538b336f
- https://security.netapp.com/advisory/ntap-20190710-0002/
- https://support.f5.com/csp/article/K60924046
- https://support.f5.com/csp/article/K60924046?utm_source=f5support&%3Butm_medium=RSS
- https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg2014901.html
Modified: 2024-11-21
CVE-2019-12817
arch/powerpc/mm/mmu_context_book3s64.c in the Linux kernel before 5.1.15 for powerpc has a bug where unrelated processes may be able to read/write to one another's virtual memory under certain conditions via an mmap above 512 TB. Only a subset of powerpc systems are affected.
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html
- http://www.openwall.com/lists/oss-security/2019/06/24/5
- http://www.securityfocus.com/bid/108884
- https://access.redhat.com/errata/RHSA-2019:2703
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.15
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ca72d88378b2f2444d3ec145dd442d449d3fefbc
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OTLN3KQYEEWWAJYA4BUYYDMWWXCJQNV2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WSKLL2374YGFQR6LSVCFGTTCRGBTLAWZ/
- https://seclists.org/bugtraq/2019/Aug/13
- https://support.f5.com/csp/article/K12876166
- https://support.f5.com/csp/article/K12876166?utm_source=f5support&%3Butm_medium=RSS
- https://usn.ubuntu.com/4031-1/
- https://www.debian.org/security/2019/dsa-4495
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html
- http://www.openwall.com/lists/oss-security/2019/06/24/5
- http://www.securityfocus.com/bid/108884
- https://access.redhat.com/errata/RHSA-2019:2703
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.15
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ca72d88378b2f2444d3ec145dd442d449d3fefbc
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OTLN3KQYEEWWAJYA4BUYYDMWWXCJQNV2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WSKLL2374YGFQR6LSVCFGTTCRGBTLAWZ/
- https://seclists.org/bugtraq/2019/Aug/13
- https://support.f5.com/csp/article/K12876166
- https://support.f5.com/csp/article/K12876166?utm_source=f5support&%3Butm_medium=RSS
- https://usn.ubuntu.com/4031-1/
- https://www.debian.org/security/2019/dsa-4495