ALT-PU-2021-5009-1

Обновление пакета kernel-image-std-def в ветке sisyphus

Версия5.10.78-alt1
Задание#289217
Опубликовано2021-11-09
Макс. серьёзностьMEDIUM
Серьёзность:

Закрытые проблемы (4)

BDU:2024-10630
MEDIUM4.4

Уязвимость компонента khugepaged ядра операционной системы Linux, позволяющая нарушителю читать и манипулировать данными

Опубликовано: 2024-12-03Изменено: 2025-08-19
CVSS 3.xСРЕДНЯЯ 4.4
CVSS:3.x/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
CVSS 2.0НИЗКАЯ 3.2
CVSS:2.0/AV:L/AC:L/Au:S/C:P/I:P/A:N
Ссылки
BDU:2025-14233
MEDIUM6.0

Уязвимость функции scsi_device_put() модуля drivers/scsi/scsi.c драйвера поддержки устройств SCSI ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании

Опубликовано: 2025-11-16
CVSS 3.xСРЕДНЯЯ 6.0
CVSS:3.x/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
CVSS 2.0СРЕДНЯЯ 5.9
CVSS:2.0/AV:L/AC:L/Au:M/C:C/I:N/A:C
Ссылки
CVE-2021-47480
MEDIUM5.5

In the Linux kernel, the following vulnerability has been resolved: scsi: core: Put LLD module refcnt after SCSI device is released SCSI host release is triggered when SCSI device is freed. We have to make sure that the low-level device driver module won't be unloaded before SCSI host instance is released because shost->hostt is required in the release handler. Make sure to put LLD module refcnt after SCSI device is released. Fixes a kernel panic of 'BUG: unable to handle page fault for address' reported by Changhui and Yi.

Опубликовано: 2024-05-22Изменено: 2025-09-29
CVSS 3.xСРЕДНЯЯ 5.5
CVSS:3.x/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-47491
MEDIUM5.5

In the Linux kernel, the following vulnerability has been resolved: mm: khugepaged: skip huge page collapse for special files The read-only THP for filesystems will collapse THP for files opened readonly and mapped with VM_EXEC. The intended usecase is to avoid TLB misses for large text segments. But it doesn't restrict the file types so a THP could be collapsed for a non-regular file, for example, block device, if it is opened readonly and mapped with EXEC permission. This may cause bugs, like [1] and [2]. This is definitely not the intended usecase, so just collapse THP for regular files in order to close the attack surface. [shy828301@gmail.com: fix vm_file check [3]]

Опубликовано: 2024-05-22Изменено: 2025-09-29
CVSS 3.xСРЕДНЯЯ 5.5
CVSS:3.x/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H