ALT-PU-2020-1944-1
Package kernel-image-un-def updated to version 5.6.12-alt1 for branch sisyphus in task 251537.
Closed vulnerabilities
BDU:2020-02428
Уязвимость реализации файловой системы FUSE ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-02431
Уязвимость функции sg_write ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код
BDU:2020-02432
Уязвимость функции btree_gc_coalesce (drivers/md/bcache/btree.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-01501
Уязвимость реализации протокола TCP ядра операционных систем Linux, позволяющая нарушителю провести атаку типа «человек посередине»
Modified: 2024-11-21
CVE-2019-20794
An issue was discovered in the Linux kernel 4.18 through 5.6.11 when unprivileged user namespaces are allowed. A user can create their own PID namespace, and mount a FUSE filesystem. Upon interaction with this FUSE filesystem, if the userspace component is terminated via a kill of the PID namespace's pid 1, it will result in a hung task, and resources being permanently locked up until system reboot. This can result in resource exhaustion.
- [oss-security] 20200824 CVE-2019-20794 kernel: task processes not being properly ended could lead to resource exhaustion
- [oss-security] 20200824 CVE-2019-20794 kernel: task processes not being properly ended could lead to resource exhaustion
- https://github.com/sargun/fuse-example
- https://github.com/sargun/fuse-example
- https://security.netapp.com/advisory/ntap-20200608-0001/
- https://security.netapp.com/advisory/ntap-20200608-0001/
- https://sourceforge.net/p/fuse/mailman/message/36598753/
- https://sourceforge.net/p/fuse/mailman/message/36598753/
Modified: 2024-11-21
CVE-2020-12770
An issue was discovered in the Linux kernel through 5.6.11. sg_write lacks an sg_remove_request call in a certain failure case, aka CID-83c6f2390040.
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=83c6f2390040f188cc25b270b4befeb5628c1aee
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- FEDORA-2020-c6b9fff7f8
- FEDORA-2020-5a69decc0c
- FEDORA-2020-4c69987c40
- https://lkml.org/lkml/2020/4/13/870
- https://security.netapp.com/advisory/ntap-20200608-0001/
- USN-4411-1
- USN-4412-1
- USN-4413-1
- USN-4414-1
- USN-4419-1
- DSA-4698
- DSA-4699
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=83c6f2390040f188cc25b270b4befeb5628c1aee
- DSA-4699
- DSA-4698
- USN-4419-1
- USN-4414-1
- USN-4413-1
- USN-4412-1
- USN-4411-1
- https://security.netapp.com/advisory/ntap-20200608-0001/
- https://lkml.org/lkml/2020/4/13/870
- FEDORA-2020-4c69987c40
- FEDORA-2020-5a69decc0c
- FEDORA-2020-c6b9fff7f8
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
Modified: 2024-11-21
CVE-2020-12771
An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.
- openSUSE-SU-2020:1062
- openSUSE-SU-2020:1153
- [debian-lts-announce] 20200812 [SECURITY] [DLA 2323-1] linux-4.19 new package
- [debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
- https://lkml.org/lkml/2020/4/26/87
- https://security.netapp.com/advisory/ntap-20200608-0001/
- USN-4462-1
- USN-4463-1
- USN-4465-1
- USN-4483-1
- USN-4485-1
- https://www.oracle.com/security-alerts/cpuApr2021.html
- openSUSE-SU-2020:1062
- https://www.oracle.com/security-alerts/cpuApr2021.html
- USN-4485-1
- USN-4483-1
- USN-4465-1
- USN-4463-1
- USN-4462-1
- https://security.netapp.com/advisory/ntap-20200608-0001/
- https://lkml.org/lkml/2020/4/26/87
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
- [debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
- [debian-lts-announce] 20200812 [SECURITY] [DLA 2323-1] linux-4.19 new package
- openSUSE-SU-2020:1153
Modified: 2024-11-21
CVE-2020-36516
An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim's TCP session or terminate that session.