2024-06-28 13:17:52 +00:00

247 lines
11 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20191285",
"Version": "oval:org.altlinux.errata:def:20191285",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2019-1285: package `kernel-image-std-def` update to version 4.14.102-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2019-1285",
"RefURL": "https://errata.altlinux.org/ALT-PU-2019-1285",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-01346",
"RefURL": "https://bdu.fstec.ru/vul/2019-01346",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01352",
"RefURL": "https://bdu.fstec.ru/vul/2019-01352",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02782",
"RefURL": "https://bdu.fstec.ru/vul/2019-02782",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03996",
"RefURL": "https://bdu.fstec.ru/vul/2019-03996",
"Source": "BDU"
},
{
"RefID": "CVE-2018-1000026",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000026",
"Source": "CVE"
},
{
"RefID": "CVE-2019-3819",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-3819",
"Source": "CVE"
},
{
"RefID": "CVE-2019-6974",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-6974",
"Source": "CVE"
},
{
"RefID": "CVE-2019-7221",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7221",
"Source": "CVE"
},
{
"RefID": "CVE-2019-7222",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7222",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-std-def to version 4.14.102-alt1. \nSecurity Fix(es):\n\n * BDU:2019-01346: Уязвимость функции kvm_ioctl_create_device ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01352: Уязвимость подсистемы виртуализации Kernel-based Virtual Machine (KVM) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2019-02782: Уязвимость функции hid_debug_events_read () ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03996: Уязвимость ядра операционной системы Linux, связанная с отсутствием защиты служебных данных, позволяющая нарушителю раскрыть защищаемую информацию\n\n * CVE-2018-1000026: Linux Linux kernel version at least v4.8 onwards, probably well before contains a Insufficient input validation vulnerability in bnx2x network card driver that can result in DoS: Network card firmware assertion takes card off-line. This attack appear to be exploitable via An attacker on a must pass a very large, specially crafted packet to the bnx2x card. This can be done from an untrusted guest VM..\n\n * CVE-2019-3819: A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\"root\") can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable.\n\n * CVE-2019-6974: In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.\n\n * CVE-2019-7221: The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.\n\n * CVE-2019-7222: The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2019-02-22"
},
"Updated": {
"Date": "2019-02-22"
},
"BDUs": [
{
"ID": "BDU:2019-01346",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-01346",
"Impact": "High",
"Public": "20190207"
},
{
"ID": "BDU:2019-01352",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-01352",
"Impact": "High",
"Public": "20190207"
},
{
"ID": "BDU:2019-02782",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-835",
"Href": "https://bdu.fstec.ru/vul/2019-02782",
"Impact": "Low",
"Public": "20190124"
},
{
"ID": "BDU:2019-03996",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-03996",
"Impact": "Low",
"Public": "20190207"
}
],
"CVEs": [
{
"ID": "CVE-2018-1000026",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000026",
"Impact": "High",
"Public": "20180209"
},
{
"ID": "CVE-2019-3819",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3819",
"Impact": "Low",
"Public": "20190125"
},
{
"ID": "CVE-2019-6974",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-6974",
"Impact": "High",
"Public": "20190215"
},
{
"ID": "CVE-2019-7221",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7221",
"Impact": "High",
"Public": "20190321"
},
{
"ID": "CVE-2019-7222",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7222",
"Impact": "Low",
"Public": "20190321"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20191285001",
"Comment": "kernel-doc-std is earlier than 1:4.14.102-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191285002",
"Comment": "kernel-headers-modules-std-def is earlier than 1:4.14.102-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191285003",
"Comment": "kernel-headers-std-def is earlier than 1:4.14.102-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191285004",
"Comment": "kernel-image-domU-std-def is earlier than 1:4.14.102-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191285005",
"Comment": "kernel-image-std-def is earlier than 1:4.14.102-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191285006",
"Comment": "kernel-modules-drm-ancient-std-def is earlier than 1:4.14.102-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191285007",
"Comment": "kernel-modules-drm-nouveau-std-def is earlier than 1:4.14.102-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191285008",
"Comment": "kernel-modules-drm-radeon-std-def is earlier than 1:4.14.102-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191285009",
"Comment": "kernel-modules-drm-std-def is earlier than 1:4.14.102-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191285010",
"Comment": "kernel-modules-ide-std-def is earlier than 1:4.14.102-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191285011",
"Comment": "kernel-modules-kvm-std-def is earlier than 1:4.14.102-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191285012",
"Comment": "kernel-modules-staging-std-def is earlier than 1:4.14.102-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191285013",
"Comment": "kernel-modules-v4l-std-def is earlier than 1:4.14.102-alt1"
}
]
}
]
}
}
]
}