ALT-PU-2020-1930-1
Package kernel-image-std-def updated to version 5.4.39-alt1 for branch p9 in task 251230.
Closed vulnerabilities
                                                                                    Published: 2020-04-21
                                                                                    
                                                                                
                                                                            BDU:2020-03819
Уязвимость функции enable_sacf_uaccess ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
                                                                                        
                                                                                        
                                                                                            Severity: HIGH (7.0)
                                                                                        
                                                                                        
                                                                                        
                                                                                        
                                                                                            Vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
                                                                                        
                                                                                        
                                                                                    
                                                                                
                                                                                        
                                                                                        
                                                                                            Severity: MEDIUM (6.6)
                                                                                        
                                                                                        
                                                                                        
                                                                                        
                                                                                            Vector: AV:L/AC:M/Au:S/C:C/I:C/A:C
                                                                                        
                                                                                        
                                                                                    
                                                                                References:
                                                                        
                                                                        
                                                                    
                                                                                    Published: 2020-04-29
Modified: 2024-11-21
                                                                            Modified: 2024-11-21
CVE-2020-11884
In the Linux kernel 4.19 through 5.6.7 on the s390 platform, code execution may occur because of a race condition, as demonstrated by code in enable_sacf_uaccess in arch/s390/lib/uaccess.c that fails to protect against a concurrent page table upgrade, aka CID-3f777e19d171. A crash could also occur.
                                                                                        
                                                                                        
                                                                                            Severity: MEDIUM (6.9)
                                                                                        
                                                                                        
                                                                                        
                                                                                        
                                                                                            Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
                                                                                        
                                                                                        
                                                                                    
                                                                                
                                                                                        
                                                                                        
                                                                                            Severity: HIGH (7.0)
                                                                                        
                                                                                        
                                                                                        
                                                                                        
                                                                                            Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
                                                                                        
                                                                                        
                                                                                    
                                                                                References:
                                                                        - https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=215d1f3928713d6eaec67244bcda72105b898000
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3f777e19d171670ab558a6d5e6b1ac7f9b6c574f
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3TZBP2HINNAX7HKHCOUMIFVQPV6GWMCZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQUVKC3IPUC5B374VVAZV4J5P3GAUGSW/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKVJMS4GQRH5SO35WM5GINCFAGXQ3ZW6/
- https://security.netapp.com/advisory/ntap-20200608-0001/
- https://usn.ubuntu.com/4342-1/
- https://usn.ubuntu.com/4343-1/
- https://usn.ubuntu.com/4345-1/
- https://www.debian.org/security/2020/dsa-4667
- https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=215d1f3928713d6eaec67244bcda72105b898000
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3f777e19d171670ab558a6d5e6b1ac7f9b6c574f
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3TZBP2HINNAX7HKHCOUMIFVQPV6GWMCZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQUVKC3IPUC5B374VVAZV4J5P3GAUGSW/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKVJMS4GQRH5SO35WM5GINCFAGXQ3ZW6/
- https://security.netapp.com/advisory/ntap-20200608-0001/
- https://usn.ubuntu.com/4342-1/
- https://usn.ubuntu.com/4343-1/
- https://usn.ubuntu.com/4345-1/
- https://www.debian.org/security/2020/dsa-4667
