173 lines
7.4 KiB
JSON
173 lines
7.4 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20201027",
|
||
"Version": "oval:org.altlinux.errata:def:20201027",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2020-1027: package `kernel-image-un-def` update to version 5.4.11-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch c10f1"
|
||
],
|
||
"Products": [
|
||
"ALT SP Workstation",
|
||
"ALT SP Server"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2020-1027",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-1027",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04788",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04788",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04865",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04865",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-14901",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14901",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-20177",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-20177",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades kernel-image-un-def to version 5.4.11-alt1. \nSecurity Fix(es):\n\n * BDU:2019-04788: Уязвимость функции из marvell/mwifiex/tdls.c драйвера Marvell WiFi ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-04865: Уязвимость ядра операционной системы Linux , связанная с чтением за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2019-14901: A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.\n\n * CVE-2021-20177: A flaw was found in the Linux kernel's implementation of string matching within a packet. A privileged user (with root or CAP_NET_ADMIN) when inserting iptables rules could insert a rule which can panic the system. Kernel before kernel 5.5-rc1 is affected.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Critical",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2020-01-12"
|
||
},
|
||
"Updated": {
|
||
"Date": "2020-01-12"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2019-04788",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122, CWE-400, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04788",
|
||
"Impact": "Critical",
|
||
"Public": "20191128"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04865",
|
||
"CVSS": "AV:L/AC:L/Au:M/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04865",
|
||
"Impact": "Low",
|
||
"Public": "20210526"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2019-14901",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-400",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14901",
|
||
"Impact": "Critical",
|
||
"Public": "20191129"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-20177",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-20177",
|
||
"Impact": "Low",
|
||
"Public": "20210526"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:spworkstation:10",
|
||
"cpe:/o:alt:spserver:10"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:4001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201027001",
|
||
"Comment": "kernel-doc-un is earlier than 1:5.4.11-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201027002",
|
||
"Comment": "kernel-headers-modules-un-def is earlier than 1:5.4.11-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201027003",
|
||
"Comment": "kernel-headers-un-def is earlier than 1:5.4.11-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201027004",
|
||
"Comment": "kernel-image-domU-un-def is earlier than 1:5.4.11-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201027005",
|
||
"Comment": "kernel-image-un-def is earlier than 1:5.4.11-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201027006",
|
||
"Comment": "kernel-modules-drm-ancient-un-def is earlier than 1:5.4.11-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201027007",
|
||
"Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:5.4.11-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201027008",
|
||
"Comment": "kernel-modules-drm-radeon-un-def is earlier than 1:5.4.11-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201027009",
|
||
"Comment": "kernel-modules-drm-un-def is earlier than 1:5.4.11-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201027010",
|
||
"Comment": "kernel-modules-ide-un-def is earlier than 1:5.4.11-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201027011",
|
||
"Comment": "kernel-modules-staging-un-def is earlier than 1:5.4.11-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201027012",
|
||
"Comment": "kernel-modules-v4l-un-def is earlier than 1:5.4.11-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |