ALT-PU-2020-3256-1
Package kernel-image-un-def updated to version 5.9.7-alt1 for branch sisyphus in task 261490.
Closed vulnerabilities
BDU:2020-05544
Уязвимость функции KD_FONT_OP_COPY драйвера fbcon ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-27815
A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
- http://www.openwall.com/lists/oss-security/2020/11/30/5
- http://www.openwall.com/lists/oss-security/2020/12/28/1
- https://bugzilla.redhat.com/show_bug.cgi?id=1897668%2C
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c61b3e4839007668360ed8b87d7da96d2e59fc6c
- https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html
- https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
- https://security.netapp.com/advisory/ntap-20210702-0004/
- https://www.debian.org/security/2021/dsa-4843
- https://www.openwall.com/lists/oss-security/2020/11/30/5%2C
- https://www.openwall.com/lists/oss-security/2020/12/28/1%2C
- http://www.openwall.com/lists/oss-security/2020/11/30/5
- http://www.openwall.com/lists/oss-security/2020/12/28/1
- https://bugzilla.redhat.com/show_bug.cgi?id=1897668%2C
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c61b3e4839007668360ed8b87d7da96d2e59fc6c
- https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html
- https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
- https://security.netapp.com/advisory/ntap-20210702-0004/
- https://www.debian.org/security/2021/dsa-4843
- https://www.openwall.com/lists/oss-security/2020/11/30/5%2C
- https://www.openwall.com/lists/oss-security/2020/12/28/1%2C
Modified: 2024-11-21
CVE-2020-28974
A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.
- http://www.openwall.com/lists/oss-security/2020/11/25/1
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9.7
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4e0dff2095c579b142d5a0693257f1c58b4804
- https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html
- https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html
- https://seclists.org/oss-sec/2020/q4/104
- https://security.netapp.com/advisory/ntap-20210108-0003/
- http://www.openwall.com/lists/oss-security/2020/11/25/1
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9.7
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4e0dff2095c579b142d5a0693257f1c58b4804
- https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html
- https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html
- https://seclists.org/oss-sec/2020/q4/104
- https://security.netapp.com/advisory/ntap-20210108-0003/