{ "Definition": [ { "ID": "oval:org.altlinux.errata:def:20141009", "Version": "oval:org.altlinux.errata:def:20141009", "Class": "patch", "Metadata": { "Title": "ALT-PU-2014-1009: package `kernel-image-el-def` update to version 2.6.32-alt17", "AffectedList": [ { "Family": "unix", "Platforms": [ "ALT Linux branch c9f2" ], "Products": [ "ALT SPWorkstation", "ALT SPServer" ] } ], "References": [ { "RefID": "ALT-PU-2014-1009", "RefURL": "https://errata.altlinux.org/ALT-PU-2014-1009", "Source": "ALTPU" }, { "RefID": "BDU:2014-00095", "RefURL": "https://bdu.fstec.ru/vul/2014-00095", "Source": "BDU" }, { "RefID": "CVE-2013-6367", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-6367", "Source": "CVE" }, { "RefID": "CVE-2013-6368", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-6368", "Source": "CVE" } ], "Description": "This update upgrades kernel-image-el-def to version 2.6.32-alt17. \nSecurity Fix(es):\n\n * BDU:2014-00095: Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании\n\n * CVE-2013-6367: The apic_get_tmcct function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via crafted modifications of the TMICT value.\n\n * CVE-2013-6368: The KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges or cause a denial of service (system crash) via a VAPIC synchronization operation involving a page-end address.", "Advisory": { "From": "errata.altlinux.org", "Severity": "Low", "Rights": "Copyright 2024 BaseALT Ltd.", "Issued": { "Date": "2014-01-08" }, "Updated": { "Date": "2014-01-08" }, "BDUs": [ { "ID": "BDU:2014-00095", "CVSS": "AV:A/AC:M/Au:N/C:N/I:N/A:C", "CWE": "CWE-189", "Href": "https://bdu.fstec.ru/vul/2014-00095", "Impact": "Low", "Public": "20131214" } ], "CVEs": [ { "ID": "CVE-2013-6367", "CVSS": "AV:A/AC:M/Au:N/C:N/I:N/A:C", "CWE": "CWE-189", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-6367", "Impact": "Low", "Public": "20131214" }, { "ID": "CVE-2013-6368", "CVSS": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "CWE": "CWE-20", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-6368", "Impact": "Low", "Public": "20131214" } ], "AffectedCPEs": { "CPEs": [ "cpe:/o:alt:spworkstation:8.4", "cpe:/o:alt:spserver:8.4" ] } } }, "Criteria": { "Operator": "AND", "Criterions": [ { "TestRef": "oval:org.altlinux.errata:tst:3001", "Comment": "ALT Linux must be installed" } ], "Criterias": [ { "Operator": "OR", "Criterions": [ { "TestRef": "oval:org.altlinux.errata:tst:20141009001", "Comment": "firmware-kernel-el-def is earlier than 0:2.6.32-alt17" }, { "TestRef": "oval:org.altlinux.errata:tst:20141009002", "Comment": "kernel-doc-el-def is earlier than 0:2.6.32-alt17" }, { "TestRef": "oval:org.altlinux.errata:tst:20141009003", "Comment": "kernel-docbook-el-def is earlier than 0:2.6.32-alt17" }, { "TestRef": "oval:org.altlinux.errata:tst:20141009004", "Comment": "kernel-headers-el-def is earlier than 0:2.6.32-alt17" }, { "TestRef": "oval:org.altlinux.errata:tst:20141009005", "Comment": "kernel-headers-modules-el-def is earlier than 0:2.6.32-alt17" }, { "TestRef": "oval:org.altlinux.errata:tst:20141009006", "Comment": "kernel-image-el-def is earlier than 0:2.6.32-alt17" }, { "TestRef": "oval:org.altlinux.errata:tst:20141009007", "Comment": "kernel-man-el-def is earlier than 0:2.6.32-alt17" }, { "TestRef": "oval:org.altlinux.errata:tst:20141009008", "Comment": "kernel-src-el-def is earlier than 0:2.6.32-alt17" } ] } ] } } ] }