ALT-PU-2020-2264-1
Package kernel-image-un-def updated to version 5.7.7-alt1 for branch sisyphus in task 254339.
Closed vulnerabilities
Published: 2020-06-18
BDU:2020-03435
Уязвимость функции usbtest_disconnect ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
Severity: MEDIUM (5.5)
Vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
References:
Published: 2020-06-30
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2020-15393
In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.
Severity: MEDIUM (5.5)
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
References:
- openSUSE-SU-2020:1062
- openSUSE-SU-2020:1062
- openSUSE-SU-2020:1153
- openSUSE-SU-2020:1153
- https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=831eebad70a25f55b5745453ac252d4afe997187
- https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=831eebad70a25f55b5745453ac252d4afe997187
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=28ebeb8db77035e058a510ce9bd17c2b9a009dba
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=28ebeb8db77035e058a510ce9bd17c2b9a009dba
- [debian-lts-announce] 20200812 [SECURITY] [DLA 2323-1] linux-4.19 new package
- [debian-lts-announce] 20200812 [SECURITY] [DLA 2323-1] linux-4.19 new package
- [debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
- [debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
- https://lkml.org/lkml/2020/6/2/968
- https://lkml.org/lkml/2020/6/2/968
- USN-4463-1
- USN-4463-1
- USN-4465-1
- USN-4465-1
- USN-4483-1
- USN-4483-1
- USN-4485-1
- USN-4485-1
Published: 2020-07-16
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2020-15780
An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.
Severity: MEDIUM (6.7)
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
References:
- openSUSE-SU-2020:1153
- openSUSE-SU-2020:1153
- openSUSE-SU-2020:1236
- openSUSE-SU-2020:1236
- [oss-security] 20200720 Re: Re: lockdown bypass on mainline kernel for loading unsigned modules
- [oss-security] 20200720 Re: Re: lockdown bypass on mainline kernel for loading unsigned modules
- [oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities
- [oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities
- [oss-security] 20200730 UEFI SecureBoot bypass fixes rolled out to kernels below radar
- [oss-security] 20200730 UEFI SecureBoot bypass fixes rolled out to kernels below radar
- [oss-security] 20200730 Re: UEFI SecureBoot bypass fixes rolled out to kernels below radar
- [oss-security] 20200730 Re: UEFI SecureBoot bypass fixes rolled out to kernels below radar
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.7
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.7
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75b0cea7bf307f362057cc778efe89af4c615354
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75b0cea7bf307f362057cc778efe89af4c615354
- https://git.zx2c4.com/american-unsigned-language/tree/american-unsigned-language-2.sh
- https://git.zx2c4.com/american-unsigned-language/tree/american-unsigned-language-2.sh
- USN-4425-1
- USN-4425-1
- USN-4426-1
- USN-4426-1
- USN-4439-1
- USN-4439-1
- USN-4440-1
- USN-4440-1
- https://www.openwall.com/lists/oss-security/2020/06/15/3
- https://www.openwall.com/lists/oss-security/2020/06/15/3