vuln-list-alt/oval/c9f2/ALT-PU-2019-1896/definitions.json
2024-12-12 21:07:30 +00:00

457 lines
23 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20191896",
"Version": "oval:org.altlinux.errata:def:20191896",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2019-1896: package `kernel-image-mp` update to version 5.1.4-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2019-1896",
"RefURL": "https://errata.altlinux.org/ALT-PU-2019-1896",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-02780",
"RefURL": "https://bdu.fstec.ru/vul/2019-02780",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03092",
"RefURL": "https://bdu.fstec.ru/vul/2019-03092",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03630",
"RefURL": "https://bdu.fstec.ru/vul/2019-03630",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04720",
"RefURL": "https://bdu.fstec.ru/vul/2019-04720",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00116",
"RefURL": "https://bdu.fstec.ru/vul/2020-00116",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00167",
"RefURL": "https://bdu.fstec.ru/vul/2020-00167",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00358",
"RefURL": "https://bdu.fstec.ru/vul/2020-00358",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00844",
"RefURL": "https://bdu.fstec.ru/vul/2020-00844",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00845",
"RefURL": "https://bdu.fstec.ru/vul/2020-00845",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02044",
"RefURL": "https://bdu.fstec.ru/vul/2020-02044",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03082",
"RefURL": "https://bdu.fstec.ru/vul/2021-03082",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03138",
"RefURL": "https://bdu.fstec.ru/vul/2022-03138",
"Source": "BDU"
},
{
"RefID": "CVE-2019-10142",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-10142",
"Source": "CVE"
},
{
"RefID": "CVE-2019-11683",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11683",
"Source": "CVE"
},
{
"RefID": "CVE-2019-11833",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11833",
"Source": "CVE"
},
{
"RefID": "CVE-2019-11884",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11884",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15216",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15216",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15666",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15666",
"Source": "CVE"
},
{
"RefID": "CVE-2019-18885",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18885",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19227",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19227",
"Source": "CVE"
},
{
"RefID": "CVE-2019-20096",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-20096",
"Source": "CVE"
},
{
"RefID": "CVE-2019-25045",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-25045",
"Source": "CVE"
},
{
"RefID": "CVE-2019-3459",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-3459",
"Source": "CVE"
},
{
"RefID": "CVE-2019-3460",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-3460",
"Source": "CVE"
},
{
"RefID": "CVE-2019-3900",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-3900",
"Source": "CVE"
},
{
"RefID": "CVE-2019-9500",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9500",
"Source": "CVE"
},
{
"RefID": "CVE-2023-3022",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-3022",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-mp to version 5.1.4-alt1. \nSecurity Fix(es):\n\n * BDU:2019-02780: Уязвимость файла fs/ext4/extents.c ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2019-03092: Уязвимость драйвера drivers/usb/misc/yurex.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03630: Уязвимость модуля vhost_net ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04720: Уязвимость компонента __xfrm_policy_unlink ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00116: Уязвимость функций net/appletalk/aarp.c и net/appletalk/ddp.c подсистемы AppleTalk ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00167: Уязвимость функции fs/btrfs/volumes.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00358: Уязвимость функции __feat_register_sp() ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00844: Уязвимость функции L2CAP_PARSE_CONF_RSP ядра операционных систем Linux, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-00845: Уязвимость функции L2CAP_GET_CONF_OPT ядра операционных систем Linux, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-02044: Уязвимость функции brcmf_wowl_nd_results драйвер Broadcom brcmfmac WiFi ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2021-03082: Уязвимость функции do_hidp_sock_ioctl ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-03138: Уязвимость подсистемы XFRM ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании\n\n * CVE-2019-10142: A flaw was found in the Linux kernel's freescale hypervisor manager implementation, kernel versions 5.0.x up to, excluding 5.0.17. A parameter passed to an ioctl was incorrectly validated and used in size calculations for the page size calculation. An attacker can use this flaw to crash the system, corrupt memory, or create other adverse security affects.\n\n * CVE-2019-11683: udp_gro_receive_segment in net/ipv4/udp_offload.c in the Linux kernel 5.x before 5.0.13 allows remote attackers to cause a denial of service (slab-out-of-bounds memory corruption) or possibly have unspecified other impact via UDP packets with a 0 payload, because of mishandling of padded packets, aka the \"GRO packet of death\" issue.\n\n * CVE-2019-11833: fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem.\n\n * CVE-2019-11884: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a '\\0' character.\n\n * CVE-2019-15216: An issue was discovered in the Linux kernel before 5.0.14. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/yurex.c driver.\n\n * CVE-2019-15666: An issue was discovered in the Linux kernel before 5.0.19. There is an out-of-bounds array access in __xfrm_policy_unlink, which will cause denial of service, because verify_newpolicy_info in net/xfrm/xfrm_user.c mishandles directory validation.\n\n * CVE-2019-18885: fs/btrfs/volumes.c in the Linux kernel before 5.1 allows a btrfs_verify_dev_extents NULL pointer dereference via a crafted btrfs image because fs_devices-\u003edevices is mishandled within find_device, aka CID-09ba3bc9dd15.\n\n * CVE-2019-19227: In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122.\n\n * CVE-2019-20096: In the Linux kernel before 5.1, there is a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service, aka CID-1d3ff0950e2b.\n\n * CVE-2019-25045: An issue was discovered in the Linux kernel before 5.0.19. The XFRM subsystem has a use-after-free, related to an xfrm_state_fini panic, aka CID-dbb2483b2a46.\n\n * CVE-2019-3459: A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.\n\n * CVE-2019-3460: A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.\n\n * CVE-2019-3900: An infinite loop issue was found in the vhost_net kernel module in Linux Kernel up to and including v5.1-rc6, while handling incoming packets in handle_rx(). It could occur if one end sends packets faster than the other end can process them. A guest user, maybe remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario.\n\n * CVE-2019-9500: The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.\n\n * CVE-2023-3022: A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2019-05-23"
},
"Updated": {
"Date": "2019-05-23"
},
"BDUs": [
{
"ID": "BDU:2019-02780",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-908",
"Href": "https://bdu.fstec.ru/vul/2019-02780",
"Impact": "Low",
"Public": "20190510"
},
{
"ID": "BDU:2019-03092",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2019-03092",
"Impact": "Low",
"Public": "20190819"
},
{
"ID": "BDU:2019-03630",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-835",
"Href": "https://bdu.fstec.ru/vul/2019-03630",
"Impact": "Low",
"Public": "20190424"
},
{
"ID": "BDU:2019-04720",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2019-04720",
"Impact": "Low",
"Public": "20190301"
},
{
"ID": "BDU:2020-00116",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2020-00116",
"Impact": "Low",
"Public": "20190315"
},
{
"ID": "BDU:2020-00167",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2020-00167",
"Impact": "Low",
"Public": "20190225"
},
{
"ID": "BDU:2020-00358",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2020-00358",
"Impact": "Low",
"Public": "20190401"
},
{
"ID": "BDU:2020-00844",
"CVSS": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-20, CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-00844",
"Impact": "Low",
"Public": "20190123"
},
{
"ID": "BDU:2020-00845",
"CVSS": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-125, CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-00845",
"Impact": "Low",
"Public": "20190123"
},
{
"ID": "BDU:2020-02044",
"CVSS": "AV:A/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-122, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-02044",
"Impact": "High",
"Public": "20190219"
},
{
"ID": "BDU:2021-03082",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2021-03082",
"Impact": "Low",
"Public": "20190423"
},
{
"ID": "BDU:2022-03138",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-03138",
"Impact": "High",
"Public": "20190326"
}
],
"CVEs": [
{
"ID": "CVE-2019-10142",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-10142",
"Impact": "High",
"Public": "20190730"
},
{
"ID": "CVE-2019-11683",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11683",
"Impact": "Critical",
"Public": "20190502"
},
{
"ID": "CVE-2019-11833",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-908",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11833",
"Impact": "Low",
"Public": "20190515"
},
{
"ID": "CVE-2019-11884",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11884",
"Impact": "Low",
"Public": "20190510"
},
{
"ID": "CVE-2019-15216",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15216",
"Impact": "Low",
"Public": "20190819"
},
{
"ID": "CVE-2019-15666",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15666",
"Impact": "Low",
"Public": "20190827"
},
{
"ID": "CVE-2019-18885",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18885",
"Impact": "Low",
"Public": "20191114"
},
{
"ID": "CVE-2019-19227",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19227",
"Impact": "Low",
"Public": "20191122"
},
{
"ID": "CVE-2019-20096",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-20096",
"Impact": "Low",
"Public": "20191230"
},
{
"ID": "CVE-2019-25045",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-25045",
"Impact": "High",
"Public": "20210607"
},
{
"ID": "CVE-2019-3459",
"CVSS": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3459",
"Impact": "Low",
"Public": "20190411"
},
{
"ID": "CVE-2019-3460",
"CVSS": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3460",
"Impact": "Low",
"Public": "20190411"
},
{
"ID": "CVE-2019-3900",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3900",
"Impact": "High",
"Public": "20190425"
},
{
"ID": "CVE-2019-9500",
"CVSS": "AV:A/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9500",
"Impact": "High",
"Public": "20200116"
},
{
"ID": "CVE-2023-3022",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-3022",
"Impact": "Low",
"Public": "20230619"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20191896001",
"Comment": "kernel-headers-modules-mp is earlier than 0:5.1.4-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191896002",
"Comment": "kernel-headers-mp is earlier than 0:5.1.4-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191896003",
"Comment": "kernel-image-mp is earlier than 0:5.1.4-alt1"
}
]
}
]
}
}
]
}