228 lines
11 KiB
JSON
Raw Normal View History

2024-06-28 13:17:52 +00:00
{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20172378",
"Version": "oval:org.altlinux.errata:def:20172378",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2017-2378: package `kernel-image-un-def` update to version 4.13.5-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2017-2378",
"RefURL": "https://errata.altlinux.org/ALT-PU-2017-2378",
"Source": "ALTPU"
},
{
"RefID": "CVE-2017-1000252",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000252",
"Source": "CVE"
},
{
"RefID": "CVE-2017-12153",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-12153",
"Source": "CVE"
},
{
"RefID": "CVE-2017-12154",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-12154",
"Source": "CVE"
},
{
"RefID": "CVE-2017-12192",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-12192",
"Source": "CVE"
},
{
"RefID": "CVE-2017-14954",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-14954",
"Source": "CVE"
},
{
"RefID": "CVE-2017-15537",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-15537",
"Source": "CVE"
},
{
"RefID": "CVE-2017-18270",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-18270",
"Source": "CVE"
},
{
"RefID": "CVE-2018-1091",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-1091",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-un-def to version 4.13.5-alt1. \nSecurity Fix(es):\n\n * CVE-2017-1000252: The KVM subsystem in the Linux kernel through 4.13.3 allows guest OS users to cause a denial of service (assertion failure, and hypervisor hang or crash) via an out-of bounds guest_irq value, related to arch/x86/kvm/vmx.c and virt/kvm/eventfd.c.\n\n * CVE-2017-12153: A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.\n\n * CVE-2017-12154: The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the Linux kernel through 4.13.3 does not ensure that the \"CR8-load exiting\" and \"CR8-store exiting\" L0 vmcs02 controls exist in cases where L1 omits the \"use TPR shadow\" vmcs12 control, which allows KVM L2 guest OS users to obtain read and write access to the hardware CR8 register.\n\n * CVE-2017-12192: The keyctl_read_key function in security/keys/keyctl.c in the Key Management subcomponent in the Linux kernel before 4.13.5 does not properly consider that a key may be possessed but negatively instantiated, which allows local users to cause a denial of service (OOPS and system crash) via a crafted KEYCTL_READ operation.\n\n * CVE-2017-14954: The waitid implementation in kernel/exit.c in the Linux kernel through 4.13.4 accesses rusage data structures in unintended cases, which allows local users to obtain sensitive information, and bypass the KASLR protection mechanism, via a crafted system call.\n\n * CVE-2017-15537: The x86/fpu (Floating Point Unit) subsystem in the Linux kernel before 4.13.5, when a processor supports the xsave feature but not the xsaves feature, does not correctly handle attempts to set reserved bits in the xstate header via the ptrace() or rt_sigreturn() system call, allowing local users to read the FPU registers of other processes on the system, related to arch/x86/kernel/fpu/regset.c and arch/x86/kernel/fpu/signal.c.\n\n * CVE-2017-18270: In the Linux kernel before 4.13.5, a local user could create keyrings for other users via keyctl commands, setting unwanted defaults or causing a denial of service.\n\n * CVE-2018-1091: In the flush_tmregs_to_thread function in arch/powerpc/kernel/ptrace.c in the Linux kernel before 4.13.5, a guest kernel crash can be triggered from unprivileged userspace during a core dump on a POWER host due to a missing processor feature check and an erroneous use of transactional memory (TM) instructions in the core dump path, leading to a denial of service.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2017-10-05"
},
"Updated": {
"Date": "2017-10-05"
},
"BDUs": null,
"CVEs": [
{
"ID": "CVE-2017-1000252",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000252",
"Impact": "Low",
"Public": "20170926"
},
{
"ID": "CVE-2017-12153",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-12153",
"Impact": "Low",
"Public": "20170921"
},
{
"ID": "CVE-2017-12154",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-12154",
"Impact": "High",
"Public": "20170926"
},
{
"ID": "CVE-2017-12192",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-12192",
"Impact": "Low",
"Public": "20171012"
},
{
"ID": "CVE-2017-14954",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-14954",
"Impact": "Low",
"Public": "20171002"
},
{
"ID": "CVE-2017-15537",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-15537",
"Impact": "Low",
"Public": "20171017"
},
{
"ID": "CVE-2017-18270",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-18270",
"Impact": "High",
"Public": "20180518"
},
{
"ID": "CVE-2018-1091",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-1091",
"Impact": "Low",
"Public": "20180327"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
2024-12-12 21:07:30 +00:00
"TestRef": "oval:org.altlinux.errata:tst:4001",
2024-06-28 13:17:52 +00:00
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20172378001",
"Comment": "kernel-doc-un is earlier than 1:4.13.5-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172378002",
"Comment": "kernel-headers-modules-un-def is earlier than 1:4.13.5-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172378003",
"Comment": "kernel-headers-un-def is earlier than 1:4.13.5-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172378004",
"Comment": "kernel-image-domU-un-def is earlier than 1:4.13.5-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172378005",
"Comment": "kernel-image-un-def is earlier than 1:4.13.5-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172378006",
"Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:4.13.5-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172378007",
"Comment": "kernel-modules-drm-radeon-un-def is earlier than 1:4.13.5-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172378008",
"Comment": "kernel-modules-drm-un-def is earlier than 1:4.13.5-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172378009",
"Comment": "kernel-modules-ide-un-def is earlier than 1:4.13.5-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172378010",
"Comment": "kernel-modules-kvm-un-def is earlier than 1:4.13.5-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172378011",
"Comment": "kernel-modules-staging-un-def is earlier than 1:4.13.5-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172378012",
"Comment": "kernel-modules-v4l-un-def is earlier than 1:4.13.5-alt1"
}
]
}
]
}
}
]
}