vuln-list-alt/oval/c10f1/ALT-PU-2016-1817/definitions.json
2024-12-12 21:07:30 +00:00

171 lines
8.0 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20161817",
"Version": "oval:org.altlinux.errata:def:20161817",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2016-1817: package `runc` update to version 1.0.0-alt1.git04f275d",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2016-1817",
"RefURL": "https://errata.altlinux.org/ALT-PU-2016-1817",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-00826",
"RefURL": "https://bdu.fstec.ru/vul/2019-00826",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04920",
"RefURL": "https://bdu.fstec.ru/vul/2020-04920",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03670",
"RefURL": "https://bdu.fstec.ru/vul/2021-03670",
"Source": "BDU"
},
{
"RefID": "CVE-2019-16884",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-16884",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19921",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19921",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5736",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5736",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30465",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30465",
"Source": "CVE"
}
],
"Description": "This update upgrades runc to version 1.0.0-alt1.git04f275d. \nSecurity Fix(es):\n\n * BDU:2019-00826: Уязвимость инструмента для запуска изолированных контейнеров runc, связанная с ошибками обработки файлового дескриптора, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2020-04920: Уязвимость компонента AppArmor инструмента для запуска изолированных контейнеров runc, связанная с недостатками механизма авторизации, позволяющая нарушителю монтировать вредоносный образ Docker в каталог /proc\n\n * BDU:2021-03670: Уязвимость конфигурации инструмента для запуска изолированных контейнеров runc, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * CVE-2019-16884: runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.\n\n * CVE-2019-19921: runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vulnerability does not affect Docker due to an implementation detail that happens to block the attack.)\n\n * CVE-2019-5736: runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.\n\n * CVE-2021-30465: runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2016-08-03"
},
"Updated": {
"Date": "2016-08-03"
},
"BDUs": [
{
"ID": "BDU:2019-00826",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-216",
"Href": "https://bdu.fstec.ru/vul/2019-00826",
"Impact": "High",
"Public": "20190211"
},
{
"ID": "BDU:2020-04920",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-863",
"Href": "https://bdu.fstec.ru/vul/2020-04920",
"Impact": "High",
"Public": "20190925"
},
{
"ID": "BDU:2021-03670",
"CVSS": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-22, CWE-59, CWE-367",
"Href": "https://bdu.fstec.ru/vul/2021-03670",
"Impact": "High",
"Public": "20210519"
}
],
"CVEs": [
{
"ID": "CVE-2019-16884",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-863",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-16884",
"Impact": "High",
"Public": "20190925"
},
{
"ID": "CVE-2019-19921",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-706",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19921",
"Impact": "High",
"Public": "20200212"
},
{
"ID": "CVE-2019-5736",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-78",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5736",
"Impact": "High",
"Public": "20190211"
},
{
"ID": "CVE-2021-30465",
"CVSS": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30465",
"Impact": "High",
"Public": "20210527"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:5001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20161817001",
"Comment": "runc is earlier than 0:1.0.0-alt1.git04f275d"
}
]
}
]
}
}
]
}