ALT-PU-2020-2448-1
Package kernel-image-un-def updated to version 5.7.10-alt1 for branch sisyphus in task 255322.
Closed vulnerabilities
BDU:2021-02589
Уязвимость функции tss_invalidate_io_bitmap ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии
BDU:2021-03189
Уязвимость подсистемы cgroupv2 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
Modified: 2024-11-21
CVE-2020-14356
A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.
- openSUSE-SU-2020:1236
- openSUSE-SU-2020:1236
- openSUSE-SU-2020:1325
- openSUSE-SU-2020:1325
- https://bugzilla.kernel.org/show_bug.cgi?id=208003
- https://bugzilla.kernel.org/show_bug.cgi?id=208003
- https://bugzilla.redhat.com/show_bug.cgi?id=1868453
- https://bugzilla.redhat.com/show_bug.cgi?id=1868453
- [debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
- [debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
- [debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
- [debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
- https://lore.kernel.org/netdev/CAM_iQpUKQJrj8wE+Qa8NGR3P0L+5Uz=qo-O5+k_P60HzTde6aw%40mail.gmail.com/t/
- https://lore.kernel.org/netdev/CAM_iQpUKQJrj8wE+Qa8NGR3P0L+5Uz=qo-O5+k_P60HzTde6aw%40mail.gmail.com/t/
- https://security.netapp.com/advisory/ntap-20200904-0002/
- https://security.netapp.com/advisory/ntap-20200904-0002/
- USN-4483-1
- USN-4483-1
- USN-4484-1
- USN-4484-1
- USN-4526-1
- USN-4526-1
Modified: 2024-11-21
CVE-2020-15852
An issue was discovered in the Linux kernel 5.5 through 5.7.9, as used in Xen through 4.13.x for x86 PV guests. An attacker may be granted the I/O port permissions of an unrelated task. This occurs because tss_invalidate_io_bitmap mishandling causes a loss of synchronization between the I/O bitmaps of TSS and Xen, aka CID-cadfad870154.
- [oss-security] 20200721 Xen Security Advisory 329 v3 (CVE-2020-15852) - Linux ioperm bitmap context switching issues
- [oss-security] 20200721 Xen Security Advisory 329 v3 (CVE-2020-15852) - Linux ioperm bitmap context switching issues
- http://xenbits.xen.org/xsa/advisory-329.html
- http://xenbits.xen.org/xsa/advisory-329.html
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cadfad870154e14f745ec845708bc17d166065f2
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cadfad870154e14f745ec845708bc17d166065f2
- https://github.com/torvalds/linux/commit/cadfad870154e14f745ec845708bc17d166065f2
- https://github.com/torvalds/linux/commit/cadfad870154e14f745ec845708bc17d166065f2
- https://security.netapp.com/advisory/ntap-20200810-0001/
- https://security.netapp.com/advisory/ntap-20200810-0001/