257 lines
12 KiB
JSON
257 lines
12 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20192061",
|
||
"Version": "oval:org.altlinux.errata:def:20192061",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2019-2061: package `kernel-image-std-debug` update to version 4.19.49-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch c9f2"
|
||
],
|
||
"Products": [
|
||
"ALT SPWorkstation",
|
||
"ALT SPServer"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2019-2061",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2019-2061",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-01957",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-01957",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-01958",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-01958",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-01959",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-01959",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-01960",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-01960",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-02780",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-02780",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12126",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12126",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12127",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12127",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12130",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12130",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11091",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11091",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11833",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11833",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades kernel-image-std-debug to version 4.19.49-alt1. \nSecurity Fix(es):\n\n * BDU:2019-01957: Уязвимость процессоров Intel, связанная с микроархитектурной выборкой данных некэшируемой памяти (MDSUM), позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2019-01958: Уязвимость порта загрузки MLPDS микропрограммного обеспечения Intel, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2019-01959: Уязвимость процессоров Intel, связанная с восстановлением содержимого буферов заполнения (MFBDS), позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2019-01960: Уязвимость буфера данных MSBDS микропрограммного обеспечения Intel, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2019-02780: Уязвимость файла fs/ext4/extents.c ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf\n\n * CVE-2018-12127: Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf\n\n * CVE-2018-12130: Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf\n\n * CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf\n\n * CVE-2019-11833: fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Low",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2019-06-14"
|
||
},
|
||
"Updated": {
|
||
"Date": "2019-06-14"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2019-01957",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
|
||
"CWE": "CWE-203, CWE-385",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-01957",
|
||
"Impact": "Low",
|
||
"Public": "20190306"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-01958",
|
||
"CVSS": "AV:L/AC:M/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-203, CWE-385",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-01958",
|
||
"Impact": "Low",
|
||
"Public": "20190306"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-01959",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-203, CWE-385",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-01959",
|
||
"Impact": "Low",
|
||
"Public": "20190306"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-01960",
|
||
"CVSS": "AV:L/AC:H/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-203, CWE-385",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-01960",
|
||
"Impact": "Low",
|
||
"Public": "20190306"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-02780",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-908",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-02780",
|
||
"Impact": "Low",
|
||
"Public": "20190510"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2018-12126",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12126",
|
||
"Impact": "Low",
|
||
"Public": "20190530"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12127",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12127",
|
||
"Impact": "Low",
|
||
"Public": "20190530"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12130",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12130",
|
||
"Impact": "Low",
|
||
"Public": "20190530"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11091",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11091",
|
||
"Impact": "Low",
|
||
"Public": "20190530"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11833",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-908",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11833",
|
||
"Impact": "Low",
|
||
"Public": "20190515"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:spworkstation:8.4",
|
||
"cpe:/o:alt:spserver:8.4"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:4001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20192061001",
|
||
"Comment": "kernel-headers-modules-std-debug is earlier than 1:4.19.49-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20192061002",
|
||
"Comment": "kernel-headers-std-debug is earlier than 1:4.19.49-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20192061003",
|
||
"Comment": "kernel-image-domU-std-debug is earlier than 1:4.19.49-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20192061004",
|
||
"Comment": "kernel-image-std-debug is earlier than 1:4.19.49-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20192061005",
|
||
"Comment": "kernel-modules-drm-ancient-std-debug is earlier than 1:4.19.49-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20192061006",
|
||
"Comment": "kernel-modules-drm-nouveau-std-debug is earlier than 1:4.19.49-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20192061007",
|
||
"Comment": "kernel-modules-drm-radeon-std-debug is earlier than 1:4.19.49-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20192061008",
|
||
"Comment": "kernel-modules-drm-std-debug is earlier than 1:4.19.49-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20192061009",
|
||
"Comment": "kernel-modules-ide-std-debug is earlier than 1:4.19.49-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20192061010",
|
||
"Comment": "kernel-modules-kvm-std-debug is earlier than 1:4.19.49-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20192061011",
|
||
"Comment": "kernel-modules-staging-std-debug is earlier than 1:4.19.49-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20192061012",
|
||
"Comment": "kernel-modules-v4l-std-debug is earlier than 1:4.19.49-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |