vuln-list-alt/oval/c10f1/ALT-PU-2020-3571/definitions.json
2024-06-28 13:17:52 +00:00

303 lines
16 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20203571",
"Version": "oval:org.altlinux.errata:def:20203571",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-3571: package `kernel-image-mp` update to version 5.10.4-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-3571",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-3571",
"Source": "ALTPU"
},
{
"RefID": "BDU:2020-05539",
"RefURL": "https://bdu.fstec.ru/vul/2020-05539",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05831",
"RefURL": "https://bdu.fstec.ru/vul/2020-05831",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00014",
"RefURL": "https://bdu.fstec.ru/vul/2021-00014",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01617",
"RefURL": "https://bdu.fstec.ru/vul/2021-01617",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03443",
"RefURL": "https://bdu.fstec.ru/vul/2021-03443",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05916",
"RefURL": "https://bdu.fstec.ru/vul/2022-05916",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00628",
"RefURL": "https://bdu.fstec.ru/vul/2023-00628",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02799",
"RefURL": "https://bdu.fstec.ru/vul/2023-02799",
"Source": "BDU"
},
{
"RefID": "CVE-2020-25656",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25656",
"Source": "CVE"
},
{
"RefID": "CVE-2020-25705",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25705",
"Source": "CVE"
},
{
"RefID": "CVE-2020-27777",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777",
"Source": "CVE"
},
{
"RefID": "CVE-2020-29569",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-29569",
"Source": "CVE"
},
{
"RefID": "CVE-2020-36385",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36385",
"Source": "CVE"
},
{
"RefID": "CVE-2020-36694",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36694",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3411",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3411",
"Source": "CVE"
},
{
"RefID": "CVE-2023-0240",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0240",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-mp to version 5.10.4-alt1. \nSecurity Fix(es):\n\n * BDU:2020-05539: Уязвимость ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-05831: Уязвимость ядра операционной системы Linux, связанная с использованием памяти после её освобождения, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2021-00014: Уязвимость ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии или получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-01617: Уязвимость функции can_optimize (arch/x86/kernel/kprobes/opt.c) ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-03443: Уязвимость компонента RTAS ядра операционной системы Linux, связанная с отсутствием механизма авторизации, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05916: Уязвимость компонента drivers/infiniband/core/ucma.c ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2023-00628: Уязвимость функции io_prep_async_work() подсистемы io_uring ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2023-02799: Уязвимость функции xt_replace_table() в модуле net/netfilter/x_tables.c межсетевого экрана netfilter ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * CVE-2020-25656: A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.\n\n * CVE-2020-25705: A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version\n\n * CVE-2020-27777: A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.\n\n * CVE-2020-29569: An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring-\u003exenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback.\n\n * CVE-2020-36385: An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.\n\n * CVE-2020-36694: An issue was discovered in netfilter in the Linux kernel before 5.10. There can be a use-after-free in the packet processing context, because the per-CPU sequence count is mishandled during concurrent iptables rules replacement. This could be exploited with the CAP_NET_ADMIN capability in an unprivileged namespace. NOTE: cc00bca was reverted in 5.12.\n\n * CVE-2021-3411: A flaw was found in the Linux kernel in versions prior to 5.10. A violation of memory access was found while detecting a padding of int3 in the linking state. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\n\n * CVE-2023-0240: There is a logic error in io_uring's implementation which can be used to trigger a use-after-free vulnerability leading to privilege escalation.\n\nIn the io_prep_async_work function the assumption that the last io_grab_identity call cannot return false is not true, and in this case the function will use the init_cred or the previous linked requests identity to do operations instead of using the current identity. This can lead to reference counting issues causing use-after-free. We recommend upgrading past version 5.10.161.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-12-30"
},
"Updated": {
"Date": "2020-12-30"
},
"BDUs": [
{
"ID": "BDU:2020-05539",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-330",
"Href": "https://bdu.fstec.ru/vul/2020-05539",
"Impact": "High",
"Public": "20201016"
},
{
"ID": "BDU:2020-05831",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-05831",
"Impact": "Low",
"Public": "20201028"
},
{
"ID": "BDU:2021-00014",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-252, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-00014",
"Impact": "High",
"Public": "20201214"
},
{
"ID": "BDU:2021-01617",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-94",
"Href": "https://bdu.fstec.ru/vul/2021-01617",
"Impact": "Low",
"Public": "20200908"
},
{
"ID": "BDU:2021-03443",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-862",
"Href": "https://bdu.fstec.ru/vul/2021-03443",
"Impact": "Low",
"Public": "20201006"
},
{
"ID": "BDU:2022-05916",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-05916",
"Impact": "High",
"Public": "20200918"
},
{
"ID": "BDU:2023-00628",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-00628",
"Impact": "High",
"Public": "20210221"
},
{
"ID": "BDU:2023-02799",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-02799",
"Impact": "Critical",
"Public": "20210315"
}
],
"CVEs": [
{
"ID": "CVE-2020-25656",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25656",
"Impact": "Low",
"Public": "20201202"
},
{
"ID": "CVE-2020-25705",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-330",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25705",
"Impact": "High",
"Public": "20201117"
},
{
"ID": "CVE-2020-27777",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-862",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777",
"Impact": "Low",
"Public": "20201215"
},
{
"ID": "CVE-2020-29569",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-29569",
"Impact": "High",
"Public": "20201215"
},
{
"ID": "CVE-2020-36385",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36385",
"Impact": "High",
"Public": "20210607"
},
{
"ID": "CVE-2020-36694",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36694",
"Impact": "Low",
"Public": "20230521"
},
{
"ID": "CVE-2021-3411",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-94",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3411",
"Impact": "Low",
"Public": "20210309"
},
{
"ID": "CVE-2023-0240",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0240",
"Impact": "High",
"Public": "20230130"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20203571001",
"Comment": "kernel-headers-modules-mp is earlier than 0:5.10.4-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203571002",
"Comment": "kernel-headers-mp is earlier than 0:5.10.4-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203571003",
"Comment": "kernel-image-mp is earlier than 0:5.10.4-alt1"
}
]
}
]
}
}
]
}