nanopathi / linux-4.19.72_CVE-2020-29370

Other
0 stars 0 forks source link

CVE-2020-11884 (High) detected in linuxlinux-4.19.236, linuxlinux-4.19.236 #223

Open mend-bolt-for-github[bot] opened 2 years ago

mend-bolt-for-github[bot] commented 2 years ago

CVE-2020-11884 - High Severity Vulnerability

Vulnerable Libraries - linuxlinux-4.19.236, linuxlinux-4.19.236

Vulnerability Details

In the Linux kernel 4.19 through 5.6.7 on the s390 platform, code execution may occur because of a race condition, as demonstrated by code in enable_sacf_uaccess in arch/s390/lib/uaccess.c that fails to protect against a concurrent page table upgrade, aka CID-3f777e19d171. A crash could also occur.

Publish Date: 2020-04-29

URL: CVE-2020-11884

CVSS 3 Score Details (7.0)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2020-11884

Release Date: 2020-04-29

Fix Resolution: bpftool - 4.18.0-147.13.2,4.18.0-147.13.2,4.18.0-193.1.2,4.18.0-147.13.2,4.18.0-193.1.2,4.18.0-193.1.2,4.18.0-80.23.2,4.18.0-147.13.2,4.18.0-193.1.2,4.18.0-80.23.2;kernel-tools-libs - 4.18.0-193.1.2,4.18.0-147.13.2,4.18.0-80.23.2,4.18.0-193.1.2,4.18.0-80.23.2,4.18.0-147.13.2,4.18.0-147.13.2,4.18.0-193.1.2;perf-debuginfo - 4.18.0-147.13.2,4.18.0-80.23.2,4.18.0-193.1.2;kernel-cross-headers - 4.18.0-193.1.2,4.18.0-80.23.2,4.18.0-147.13.2,4.18.0-193.1.2,4.18.0-147.13.2,4.18.0-193.1.2,4.18.0-147.13.2,4.18.0-80.23.2,4.18.0-147.13.2,4.18.0-193.1.2;kernel-debug-debuginfo - 4.18.0-193.1.2,4.18.0-147.13.2,4.18.0-80.23.2;kernel-debug - 4.18.0-193.1.2,4.18.0-80.23.2,4.18.0-147.13.2,4.18.0-80.23.2,4.18.0-193.1.2,4.18.0-193.1.2,4.18.0-147.13.2,4.18.0-147.13.2,4.18.0-147.13.2,4.18.0-193.1.2;kernel-devel - 4.18.0-193.1.2,4.18.0-147.13.2,4.18.0-193.1.2,4.18.0-147.13.2,4.18.0-193.1.2,4.18.0-80.23.2,4.18.0-147.13.2,4.18.0-147.13.2,4.18.0-80.23.2,4.18.0-193.1.2;kernel - 4.18.0-80.23.2,4.18.0-147.13.2,4.18.0-147.13.2,4.18.0-147.13.2,4.18.0-193.1.2,4.18.0-147.13.2,4.18.0-193.1.2,4.18.0-80.23.2,4.18.0-80.23.2,4.18.0-193.1.2,4.18.0-147.13.2,4.18.0-193.1.2,4.18.0-193.1.2;bpftool-debuginfo - 4.18.0-147.13.2,4.18.0-193.1.2,4.18.0-80.23.2;kernel-zfcpdump-core - 4.18.0-147.13.2,4.18.0-193.1.2;kernel-debug-core - 4.18.0-193.1.2,4.18.0-147.13.2,4.18.0-193.1.2,4.18.0-80.23.2,4.18.0-147.13.2,4.18.0-193.1.2,4.18.0-193.1.2,4.18.0-147.13.2,4.18.0-147.13.2,4.18.0-80.23.2;kernel-modules-extra - 4.18.0-147.13.2,4.18.0-80.23.2,4.18.0-80.23.2,4.18.0-193.1.2,4.18.0-193.1.2,4.18.0-147.13.2,4.18.0-193.1.2,4.18.0-147.13.2,4.18.0-147.13.2,4.18.0-193.1.2;kernel-core - 4.18.0-147.13.2,4.18.0-193.1.2,4.18.0-80.23.2,4.18.0-193.1.2,4.18.0-147.13.2,4.18.0-193.1.2,4.18.0-147.13.2,4.18.0-193.1.2,4.18.0-80.23.2,4.18.0-147.13.2;python3-perf - 4.18.0-193.1.2,4.18.0-147.13.2,4.18.0-147.13.2,4.18.0-193.1.2,4.18.0-147.13.2,4.18.0-80.23.2,4.18.0-80.23.2,4.18.0-193.1.2,4.18.0-193.1.2,4.18.0-147.13.2;kernel-tools - 4.18.0-193.1.2,4.18.0-80.23.2,4.18.0-147.13.2,4.18.0-193.1.2,4.18.0-193.1.2,4.18.0-80.23.2,4.18.0-147.13.2,4.18.0-147.13.2;kernel-debug-modules - 4.18.0-193.1.2,4.18.0-80.23.2,4.18.0-147.13.2,4.18.0-147.13.2,4.18.0-193.1.2,4.18.0-80.23.2,4.18.0-193.1.2,4.18.0-147.13.2,4.18.0-193.1.2,4.18.0-147.13.2;kernel-modules - 4.18.0-80.23.2,4.18.0-193.1.2,4.18.0-147.13.2,4.18.0-147.13.2,4.18.0-80.23.2,4.18.0-193.1.2,4.18.0-147.13.2,4.18.0-193.1.2,4.18.0-147.13.2,4.18.0-193.1.2;kernel-tools-debuginfo - 4.18.0-80.23.2,4.18.0-147.13.2,4.18.0-193.1.2;kernel-headers - 4.18.0-193.1.2,4.18.0-147.13.2,4.18.0-80.23.2,4.18.0-147.13.2,4.18.0-147.13.2,4.18.0-193.1.2,4.18.0-193.1.2,4.18.0-147.13.2,4.18.0-193.1.2,4.18.0-80.23.2;kernel-debuginfo-common-x86_64 - 4.18.0-147.13.2,4.18.0-80.23.2,4.18.0-193.1.2;kernel-zfcpdump - 4.18.0-193.1.2,4.18.0-147.13.2;python3-perf-debuginfo - 4.18.0-147.13.2,4.18.0-80.23.2,4.18.0-193.1.2;kernel-doc - 4.18.0-193.1.2,4.18.0-147.13.2,4.18.0-80.23.2;kernel-abi-whitelists - 4.18.0-147.13.2,4.18.0-193.1.2,4.18.0-80.23.2;kernel-zfcpdump-modules - 4.18.0-193.1.2,4.18.0-147.13.2;kernel-debug-modules-extra - 4.18.0-147.13.2,4.18.0-193.1.2,4.18.0-193.1.2,4.18.0-147.13.2,4.18.0-80.23.2,4.18.0-193.1.2,4.18.0-147.13.2,4.18.0-80.23.2,4.18.0-147.13.2,4.18.0-193.1.2;kernel-zfcpdump-devel - 4.18.0-193.1.2,4.18.0-147.13.2;perf - 4.18.0-147.13.2,4.18.0-193.1.2,4.18.0-147.13.2,4.18.0-193.1.2,4.18.0-80.23.2,4.18.0-193.1.2,4.18.0-147.13.2,4.18.0-80.23.2,4.18.0-147.13.2,4.18.0-193.1.2;kernel-zfcpdump-modules-extra - 4.18.0-193.1.2,4.18.0-147.13.2;kernel-debuginfo - 4.18.0-193.1.2,4.18.0-80.23.2,4.18.0-147.13.2;kernel-debug-devel - 4.18.0-147.13.2,4.18.0-80.23.2,4.18.0-147.13.2,4.18.0-193.1.2,4.18.0-193.1.2,4.18.0-193.1.2,4.18.0-80.23.2,4.18.0-193.1.2,4.18.0-147.13.2,4.18.0-147.13.2


Step up your Open Source Security Game with Mend here

mend-bolt-for-github[bot] commented 2 years ago

:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.

mend-bolt-for-github[bot] commented 1 year ago

:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.