vuln-list-alt/oval/p11/ALT-PU-2017-2175/definitions.json
2024-12-12 21:07:30 +00:00

370 lines
18 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20172175",
"Version": "oval:org.altlinux.errata:def:20172175",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2017-2175: package `qemu` update to version 2.10.0-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2017-2175",
"RefURL": "https://errata.altlinux.org/ALT-PU-2017-2175",
"Source": "ALTPU"
},
{
"RefID": "BDU:2017-01782",
"RefURL": "https://bdu.fstec.ru/vul/2017-01782",
"Source": "BDU"
},
{
"RefID": "BDU:2017-01803",
"RefURL": "https://bdu.fstec.ru/vul/2017-01803",
"Source": "BDU"
},
{
"RefID": "BDU:2017-02081",
"RefURL": "https://bdu.fstec.ru/vul/2017-02081",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00025",
"RefURL": "https://bdu.fstec.ru/vul/2018-00025",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01313",
"RefURL": "https://bdu.fstec.ru/vul/2021-01313",
"Source": "BDU"
},
{
"RefID": "CVE-2017-10664",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-10664",
"Source": "CVE"
},
{
"RefID": "CVE-2017-10806",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-10806",
"Source": "CVE"
},
{
"RefID": "CVE-2017-11334",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-11334",
"Source": "CVE"
},
{
"RefID": "CVE-2017-11434",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-11434",
"Source": "CVE"
},
{
"RefID": "CVE-2017-12809",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-12809",
"Source": "CVE"
},
{
"RefID": "CVE-2017-13673",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-13673",
"Source": "CVE"
},
{
"RefID": "CVE-2017-15038",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-15038",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7493",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7493",
"Source": "CVE"
},
{
"RefID": "CVE-2017-8112",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-8112",
"Source": "CVE"
},
{
"RefID": "CVE-2017-8309",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-8309",
"Source": "CVE"
},
{
"RefID": "CVE-2017-8379",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-8379",
"Source": "CVE"
},
{
"RefID": "CVE-2017-8380",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-8380",
"Source": "CVE"
},
{
"RefID": "CVE-2017-9503",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-9503",
"Source": "CVE"
},
{
"RefID": "CVE-2017-9524",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-9524",
"Source": "CVE"
}
],
"Description": "This update upgrades qemu to version 2.10.0-alt1. \nSecurity Fix(es):\n\n * BDU:2017-01782: Уязвимость компонента audio.c эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2017-01803: Уязвимость в qemu-nbd эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2017-02081: Уязвимость функции megasas_mmio_write эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю оказать неопределенное воздействие\n\n * BDU:2018-00025: Уязвимость функции v9fs_xattrwalk (hw/9pfs/9p.c) эмулятора аппаратного обеспечения Qemu, позволяющая нарушителю получить конфиденциальную информацию из памяти хостовой операционной системы\n\n * BDU:2021-01313: Уязвимость эмулятора аппаратного обеспечения QEMU, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2017-10664: qemu-nbd in QEMU (aka Quick Emulator) does not ignore SIGPIPE, which allows remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt.\n\n * CVE-2017-10806: Stack-based buffer overflow in hw/usb/redirect.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (QEMU process crash) via vectors related to logging debug messages.\n\n * CVE-2017-11334: The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area.\n\n * CVE-2017-11434: The dhcp_decode function in slirp/bootp.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) via a crafted DHCP options string.\n\n * CVE-2017-12809: QEMU (aka Quick Emulator), when built with the IDE disk and CD/DVD-ROM Emulator support, allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by flushing an empty CDROM device drive.\n\n * CVE-2017-13673: The vga display update in mis-calculated the region for the dirty bitmap snapshot in case split screen mode is used causing a denial of service (assertion failure) in the cpu_physical_memory_snapshot_get_dirty function.\n\n * CVE-2017-15038: Race condition in the v9fs_xattrwalk function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS users to obtain sensitive information from host heap memory via vectors related to reading extended attributes.\n\n * CVE-2017-7493: Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System(9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing virtfs metadata files in mapped-file security mode. A guest user could use this flaw to escalate their privileges inside guest.\n\n * CVE-2017-8112: hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (infinite loop and CPU consumption) via the message ring page count.\n\n * CVE-2017-8309: Memory leak in the audio/audio.c in QEMU (aka Quick Emulator) allows remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture.\n\n * CVE-2017-8379: Memory leak in the keyboard input event handlers support in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) by rapidly generating large keyboard events.\n\n * CVE-2017-8380: Buffer overflow in the \"megasas_mmio_write\" function in Qemu 2.9.0 allows remote attackers to have unspecified impact via unknown vectors.\n\n * CVE-2017-9503: QEMU (aka Quick Emulator), when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving megasas command processing.\n\n * CVE-2017-9524: The qemu-nbd server in QEMU (aka Quick Emulator), when built with the Network Block Device (NBD) Server support, allows remote attackers to cause a denial of service (segmentation fault and server crash) by leveraging failure to ensure that all initialization occurs before talking to a client in the nbd_negotiate function.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2017-09-08"
},
"Updated": {
"Date": "2017-09-08"
},
"BDUs": [
{
"ID": "BDU:2017-01782",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CWE": "CWE-399",
"Href": "https://bdu.fstec.ru/vul/2017-01782",
"Impact": "High",
"Public": "20170428"
},
{
"ID": "BDU:2017-01803",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CWE": "CWE-19",
"Href": "https://bdu.fstec.ru/vul/2017-01803",
"Impact": "Low",
"Public": "20170611"
},
{
"ID": "BDU:2017-02081",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2017-02081",
"Impact": "High",
"Public": "20170424"
},
{
"ID": "BDU:2018-00025",
"CVSS": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-362",
"Href": "https://bdu.fstec.ru/vul/2018-00025",
"Impact": "Low",
"Public": "20171004"
},
{
"ID": "BDU:2021-01313",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2021-01313",
"Impact": "Low",
"Public": "20170624"
}
],
"CVEs": [
{
"ID": "CVE-2017-10664",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-10664",
"Impact": "High",
"Public": "20170802"
},
{
"ID": "CVE-2017-10806",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-10806",
"Impact": "Low",
"Public": "20170802"
},
{
"ID": "CVE-2017-11334",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-11334",
"Impact": "Low",
"Public": "20170802"
},
{
"ID": "CVE-2017-11434",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-11434",
"Impact": "Low",
"Public": "20170725"
},
{
"ID": "CVE-2017-12809",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-12809",
"Impact": "Low",
"Public": "20170823"
},
{
"ID": "CVE-2017-13673",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-617",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-13673",
"Impact": "Low",
"Public": "20170829"
},
{
"ID": "CVE-2017-15038",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-15038",
"Impact": "Low",
"Public": "20171010"
},
{
"ID": "CVE-2017-7493",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-732",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7493",
"Impact": "High",
"Public": "20170517"
},
{
"ID": "CVE-2017-8112",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-8112",
"Impact": "Low",
"Public": "20170502"
},
{
"ID": "CVE-2017-8309",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-772",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-8309",
"Impact": "High",
"Public": "20170523"
},
{
"ID": "CVE-2017-8379",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"CWE": "CWE-772",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-8379",
"Impact": "Low",
"Public": "20170523"
},
{
"ID": "CVE-2017-8380",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-8380",
"Impact": "Critical",
"Public": "20170828"
},
{
"ID": "CVE-2017-9503",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-9503",
"Impact": "Low",
"Public": "20170616"
},
{
"ID": "CVE-2017-9524",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-9524",
"Impact": "High",
"Public": "20170706"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20172175001",
"Comment": "ivshmem-tools is earlier than 0:2.10.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172175002",
"Comment": "qemu is earlier than 0:2.10.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172175003",
"Comment": "qemu-aux is earlier than 0:2.10.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172175004",
"Comment": "qemu-common is earlier than 0:2.10.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172175005",
"Comment": "qemu-doc is earlier than 0:2.10.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172175006",
"Comment": "qemu-guest-agent is earlier than 0:2.10.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172175007",
"Comment": "qemu-img is earlier than 0:2.10.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172175008",
"Comment": "qemu-system is earlier than 0:2.10.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172175009",
"Comment": "qemu-user is earlier than 0:2.10.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172175010",
"Comment": "qemu-user-binfmt_misc is earlier than 0:2.10.0-alt1"
}
]
}
]
}
}
]
}