2024-06-28 13:17:52 +00:00

187 lines
8.1 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20171169",
"Version": "oval:org.altlinux.errata:def:20171169",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2017-1169: package `kernel-image-un-def` update to version 4.9.10-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2017-1169",
"RefURL": "https://errata.altlinux.org/ALT-PU-2017-1169",
"Source": "ALTPU"
},
{
"RefID": "BDU:2018-00378",
"RefURL": "https://bdu.fstec.ru/vul/2018-00378",
"Source": "BDU"
},
{
"RefID": "CVE-2016-8636",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-8636",
"Source": "CVE"
},
{
"RefID": "CVE-2017-2618",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-2618",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5967",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5967",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5970",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5970",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-un-def to version 4.9.10-alt1. \nSecurity Fix(es):\n\n * BDU:2018-00378: Уязвимость функции mem_check_range (drivers/infiniband/sw/rxe/rxe_mr.c) ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании\n\n * CVE-2016-8636: Integer overflow in the mem_check_range function in drivers/infiniband/sw/rxe/rxe_mr.c in the Linux kernel before 4.9.10 allows local users to cause a denial of service (memory corruption), obtain sensitive information from kernel memory, or possibly have unspecified other impact via a write or read request involving the \"RDMA protocol over infiniband\" (aka Soft RoCE) technology.\n\n * CVE-2017-2618: A flaw was found in the Linux kernel's handling of clearing SELinux attributes on /proc/pid/attr files before 4.9.10. An empty (null) write to this file can crash the system by causing the system to attempt to access unmapped kernel memory.\n\n * CVE-2017-5967: The time subsystem in the Linux kernel through 4.9.9, when CONFIG_TIMER_STATS is enabled, allows local users to discover real PID values (as distinguished from PID values inside a PID namespace) by reading the /proc/timer_list file, related to the print_timer function in kernel/time/timer_list.c and the __timer_stats_timer_set_start_info function in kernel/time/timer.c.\n\n * CVE-2017-5970: The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel through 4.9.9 allows attackers to cause a denial of service (system crash) via (1) an application that makes crafted system calls or possibly (2) IPv4 traffic with invalid IP options.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2017-02-16"
},
"Updated": {
"Date": "2017-02-16"
},
"BDUs": [
{
"ID": "BDU:2018-00378",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2018-00378",
"Impact": "High",
"Public": "20161031"
}
],
"CVEs": [
{
"ID": "CVE-2016-8636",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-8636",
"Impact": "High",
"Public": "20170222"
},
{
"ID": "CVE-2017-2618",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-193",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-2618",
"Impact": "Low",
"Public": "20180727"
},
{
"ID": "CVE-2017-5967",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5967",
"Impact": "Low",
"Public": "20170214"
},
{
"ID": "CVE-2017-5970",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5970",
"Impact": "High",
"Public": "20170214"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20171169001",
"Comment": "kernel-doc-un is earlier than 1:4.9.10-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171169002",
"Comment": "kernel-headers-modules-un-def is earlier than 1:4.9.10-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171169003",
"Comment": "kernel-headers-un-def is earlier than 1:4.9.10-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171169004",
"Comment": "kernel-image-domU-un-def is earlier than 1:4.9.10-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171169005",
"Comment": "kernel-image-un-def is earlier than 1:4.9.10-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171169006",
"Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:4.9.10-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171169007",
"Comment": "kernel-modules-drm-radeon-un-def is earlier than 1:4.9.10-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171169008",
"Comment": "kernel-modules-drm-un-def is earlier than 1:4.9.10-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171169009",
"Comment": "kernel-modules-ide-un-def is earlier than 1:4.9.10-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171169010",
"Comment": "kernel-modules-kvm-un-def is earlier than 1:4.9.10-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171169011",
"Comment": "kernel-modules-staging-un-def is earlier than 1:4.9.10-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171169012",
"Comment": "kernel-modules-v4l-un-def is earlier than 1:4.9.10-alt1"
}
]
}
]
}
}
]
}