{ "Definition": [ { "ID": "oval:org.altlinux.errata:def:20152010", "Version": "oval:org.altlinux.errata:def:20152010", "Class": "patch", "Metadata": { "Title": "ALT-PU-2015-2010: package `kernel-image-un-def` update to version 4.3.0-alt1", "AffectedList": [ { "Family": "unix", "Platforms": [ "ALT Linux branch c10f1" ], "Products": [ "ALT SP Workstation", "ALT SP Server" ] } ], "References": [ { "RefID": "ALT-PU-2015-2010", "RefURL": "https://errata.altlinux.org/ALT-PU-2015-2010", "Source": "ALTPU" }, { "RefID": "BDU:2016-00898", "RefURL": "https://bdu.fstec.ru/vul/2016-00898", "Source": "BDU" }, { "RefID": "BDU:2017-02061", "RefURL": "https://bdu.fstec.ru/vul/2017-02061", "Source": "BDU" }, { "RefID": "CVE-2015-4004", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4004", "Source": "CVE" }, { "RefID": "CVE-2015-7872", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-7872", "Source": "CVE" }, { "RefID": "CVE-2015-8767", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8767", "Source": "CVE" }, { "RefID": "CVE-2016-0821", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-0821", "Source": "CVE" }, { "RefID": "CVE-2016-2053", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2053", "Source": "CVE" }, { "RefID": "CVE-2017-13715", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-13715", "Source": "CVE" } ], "Description": "This update upgrades kernel-image-un-def to version 4.3.0-alt1. \nSecurity Fix(es):\n\n * BDU:2016-00898: Уязвимость операционной системы Android, позволяющая нарушителю обойти механизм защиты\n\n * BDU:2017-02061: Уязвимость функции skb_flow_dissect службы flow_dissector.c (net/core/flow_dissector.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * CVE-2015-4004: The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.\n\n * CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.\n\n * CVE-2015-8767: net/sctp/sm_sideeffect.c in the Linux kernel before 4.3 does not properly manage the relationship between a lock and a socket, which allows local users to cause a denial of service (deadlock) via a crafted sctp_accept call.\n\n * CVE-2016-0821: The LIST_POISON feature in include/linux/poison.h in the Linux kernel before 4.3, as used in Android 6.0.1 before 2016-03-01, does not properly consider the relationship to the mmap_min_addr value, which makes it easier for attackers to bypass a poison-pointer protection mechanism by triggering the use of an uninitialized list entry, aka Android internal bug 26186802, a different vulnerability than CVE-2015-3636.\n\n * CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.\n\n * CVE-2017-13715: The __skb_flow_dissect function in net/core/flow_dissector.c in the Linux kernel before 4.3 does not ensure that n_proto, ip_proto, and thoff are initialized, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a single crafted MPLS packet.", "Advisory": { "From": "errata.altlinux.org", "Severity": "Critical", "Rights": "Copyright 2024 BaseALT Ltd.", "Issued": { "Date": "2015-11-18" }, "Updated": { "Date": "2015-11-18" }, "BDUs": [ { "ID": "BDU:2016-00898", "CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "CWE": "CWE-254", "Href": "https://bdu.fstec.ru/vul/2016-00898", "Impact": "Low", "Public": "20160313" }, { "ID": "BDU:2017-02061", "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "CWE": "CWE-20, CWE-665", "Href": "https://bdu.fstec.ru/vul/2017-02061", "Impact": "Critical", "Public": "20150901" } ], "CVEs": [ { "ID": "CVE-2015-4004", "CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:C", "CWE": "CWE-119", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4004", "Impact": "High", "Public": "20150607" }, { "ID": "CVE-2015-7872", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "CWE": "CWE-20", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-7872", "Impact": "Low", "Public": "20151116" }, { "ID": "CVE-2015-8767", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-362", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8767", "Impact": "Low", "Public": "20160208" }, { "ID": "CVE-2016-0821", "CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "CWE": "CWE-908", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-0821", "Impact": "Low", "Public": "20160312" }, { "ID": "CVE-2016-2053", "CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C", "CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-310", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2053", "Impact": "Low", "Public": "20160502" }, { "ID": "CVE-2017-13715", "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "CWE": "CWE-665", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-13715", "Impact": "Critical", "Public": "20170829" } ], "AffectedCPEs": { "CPEs": [ "cpe:/o:alt:spworkstation:10", "cpe:/o:alt:spserver:10" ] } } }, "Criteria": { "Operator": "AND", "Criterions": [ { "TestRef": "oval:org.altlinux.errata:tst:4001", "Comment": "ALT Linux must be installed" } ], "Criterias": [ { "Operator": "OR", "Criterions": [ { "TestRef": "oval:org.altlinux.errata:tst:20152010001", "Comment": "kernel-doc-un is earlier than 1:4.3.0-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20152010002", "Comment": "kernel-headers-modules-un-def is earlier than 1:4.3.0-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20152010003", "Comment": "kernel-headers-un-def is earlier than 1:4.3.0-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20152010004", "Comment": "kernel-image-domU-un-def is earlier than 1:4.3.0-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20152010005", "Comment": "kernel-image-un-def is earlier than 1:4.3.0-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20152010006", "Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:4.3.0-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20152010007", "Comment": "kernel-modules-drm-radeon-un-def is earlier than 1:4.3.0-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20152010008", "Comment": "kernel-modules-drm-un-def is earlier than 1:4.3.0-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20152010009", "Comment": "kernel-modules-ide-un-def is earlier than 1:4.3.0-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20152010010", "Comment": "kernel-modules-kvm-un-def is earlier than 1:4.3.0-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20152010011", "Comment": "kernel-modules-staging-un-def is earlier than 1:4.3.0-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20152010012", "Comment": "kernel-modules-v4l-un-def is earlier than 1:4.3.0-alt1" } ] } ] } } ] }