2024-12-12 21:07:30 +00:00

231 lines
10 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20181253",
"Version": "oval:org.altlinux.errata:def:20181253",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2018-1253: package `kernel-image-un-def` update to version 4.14.20-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2018-1253",
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-1253",
"Source": "ALTPU"
},
{
"RefID": "BDU:2018-00001",
"RefURL": "https://bdu.fstec.ru/vul/2018-00001",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00003",
"RefURL": "https://bdu.fstec.ru/vul/2018-00003",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04144",
"RefURL": "https://bdu.fstec.ru/vul/2021-04144",
"Source": "BDU"
},
{
"RefID": "CVE-2017-16995",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-16995",
"Source": "CVE"
},
{
"RefID": "CVE-2017-16996",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-16996",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5715",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5754",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754",
"Source": "CVE"
},
{
"RefID": "CVE-2017-8824",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-8824",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-un-def to version 4.14.20-alt1. \nSecurity Fix(es):\n\n * BDU:2018-00001: Уязвимость процессоров Intel и АRM, вызванная ошибкой контроля доступа к памяти при спекулятивном выполнении инструкций процессора, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2018-00003: Уязвимость процессоров Intel, ARM и AMD, связанная с особенностями функционирования модуля прогнозирования ветвлений, позволяющая нарушителю получить доступ к защищенной памяти из программы\n\n * BDU:2021-04144: Уязвимость функции dccp_disconnect (net/dccp/proto.c) ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * CVE-2017-16995: The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.\n\n * CVE-2017-16996: kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.\n\n * CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.\n\n * CVE-2017-5754: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.\n\n * CVE-2017-8824: The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2018-02-19"
},
"Updated": {
"Date": "2018-02-19"
},
"BDUs": [
{
"ID": "BDU:2018-00001",
"CVSS": "AV:L/AC:M/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-264",
"Href": "https://bdu.fstec.ru/vul/2018-00001",
"Impact": "Low",
"Public": "20171222"
},
{
"ID": "BDU:2018-00003",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-203, CWE-264",
"Href": "https://bdu.fstec.ru/vul/2018-00003",
"Impact": "Low",
"Public": "20180107"
},
{
"ID": "BDU:2021-04144",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-04144",
"Impact": "High",
"Public": "20171205"
}
],
"CVEs": [
{
"ID": "CVE-2017-16995",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-16995",
"Impact": "High",
"Public": "20171227"
},
{
"ID": "CVE-2017-16996",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-16996",
"Impact": "High",
"Public": "20171227"
},
{
"ID": "CVE-2017-5715",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"CWE": "CWE-203",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"Impact": "Low",
"Public": "20180104"
},
{
"ID": "CVE-2017-5754",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754",
"Impact": "Low",
"Public": "20180104"
},
{
"ID": "CVE-2017-8824",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-8824",
"Impact": "High",
"Public": "20171205"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20181253001",
"Comment": "kernel-doc-un is earlier than 1:4.14.20-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181253002",
"Comment": "kernel-headers-modules-un-def is earlier than 1:4.14.20-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181253003",
"Comment": "kernel-headers-un-def is earlier than 1:4.14.20-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181253004",
"Comment": "kernel-image-domU-un-def is earlier than 1:4.14.20-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181253005",
"Comment": "kernel-image-un-def is earlier than 1:4.14.20-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181253006",
"Comment": "kernel-modules-drm-ancient-un-def is earlier than 1:4.14.20-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181253007",
"Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:4.14.20-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181253008",
"Comment": "kernel-modules-drm-radeon-un-def is earlier than 1:4.14.20-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181253009",
"Comment": "kernel-modules-drm-un-def is earlier than 1:4.14.20-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181253010",
"Comment": "kernel-modules-ide-un-def is earlier than 1:4.14.20-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181253011",
"Comment": "kernel-modules-kvm-un-def is earlier than 1:4.14.20-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181253012",
"Comment": "kernel-modules-staging-un-def is earlier than 1:4.14.20-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181253013",
"Comment": "kernel-modules-v4l-un-def is earlier than 1:4.14.20-alt1"
}
]
}
]
}
}
]
}