221 lines
11 KiB
JSON
221 lines
11 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20182420",
|
||
"Version": "oval:org.altlinux.errata:def:20182420",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2018-2420: package `kernel-image-mp` update to version 4.18.12-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch c10f1"
|
||
],
|
||
"Products": [
|
||
"ALT SP Workstation",
|
||
"ALT SP Server"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2018-2420",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-2420",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2018-01144",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2018-01144",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00570",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00570",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-01738",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-01738",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-03067",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-03067",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01416",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01416",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-14633",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-14633",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-17182",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17182",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-17972",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17972",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-18021",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-18021",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-20511",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-20511",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades kernel-image-mp to version 4.18.12-alt1. \nSecurity Fix(es):\n\n * BDU:2018-01144: Уязвимость функции vmacache_flush_all() ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2019-00570: Уязвимость функции proc_pid_stack ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2019-01738: Уязвимость функции chap_server_compute_md5() реализации протокола ISCSI ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или получить доступ к защищаемой информации\n\n * BDU:2019-03067: Уязвимость функции ipddp_ioctl ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2021-01416: Уязвимость подсистемы виртуализации Kernel-based Virtual Machine (KVM) в файле arch/arm64/kvm/guest.c ядра операционной системы Linux, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании\n\n * CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.\n\n * CVE-2018-17182: An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_all function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations.\n\n * CVE-2018-17972: An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.\n\n * CVE-2018-18021: arch/arm64/kvm/guest.c in KVM in the Linux kernel before 4.18.12 on the arm64 platform mishandles the KVM_SET_ON_REG ioctl. This is exploitable by attackers who can create virtual machines. An attacker can arbitrarily redirect the hypervisor flow of control (with full register control). An attacker can also cause a denial of service (hypervisor panic) via an illegal exception return. This occurs because of insufficient restrictions on userspace access to the core register file, and because PSTATE.M validation does not prevent unintended execution modes.\n\n * CVE-2018-20511: An issue was discovered in the Linux kernel before 4.18.11. The ipddp_ioctl function in drivers/net/appletalk/ipddp.c allows local users to obtain sensitive kernel address information by leveraging CAP_NET_ADMIN to read the ipddp_route dev and next fields via an SIOCFINDIPDDPRT ioctl call.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "High",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2018-10-05"
|
||
},
|
||
"Updated": {
|
||
"Date": "2018-10-05"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2018-01144",
|
||
"CVSS": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2018-01144",
|
||
"Impact": "High",
|
||
"Public": "20180913"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-00570",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-284, CWE-362",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00570",
|
||
"Impact": "Low",
|
||
"Public": "20181002"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-01738",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-01738",
|
||
"Impact": "High",
|
||
"Public": "20180924"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-03067",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-03067",
|
||
"Impact": "Low",
|
||
"Public": "20180913"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01416",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01416",
|
||
"Impact": "High",
|
||
"Public": "20181001"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2018-14633",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
|
||
"CWE": "CWE-121",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-14633",
|
||
"Impact": "High",
|
||
"Public": "20180925"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-17182",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17182",
|
||
"Impact": "High",
|
||
"Public": "20180919"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-17972",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17972",
|
||
"Impact": "Low",
|
||
"Public": "20181003"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-18021",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-18021",
|
||
"Impact": "High",
|
||
"Public": "20181007"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-20511",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-20511",
|
||
"Impact": "Low",
|
||
"Public": "20181227"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:spworkstation:10",
|
||
"cpe:/o:alt:spserver:10"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:4001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182420001",
|
||
"Comment": "kernel-headers-modules-mp is earlier than 0:4.18.12-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182420002",
|
||
"Comment": "kernel-headers-mp is earlier than 0:4.18.12-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182420003",
|
||
"Comment": "kernel-image-mp is earlier than 0:4.18.12-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |