vuln-list-alt/oval/p11/ALT-PU-2018-2490/definitions.json
2024-12-12 21:07:30 +00:00

175 lines
7.5 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20182490",
"Version": "oval:org.altlinux.errata:def:20182490",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2018-2490: package `kernel-image-un-def` update to version 4.18.14-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2018-2490",
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-2490",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-03124",
"RefURL": "https://bdu.fstec.ru/vul/2019-03124",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00735",
"RefURL": "https://bdu.fstec.ru/vul/2020-00735",
"Source": "BDU"
},
{
"RefID": "CVE-2018-15471",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-15471",
"Source": "CVE"
},
{
"RefID": "CVE-2018-18445",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-18445",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-un-def to version 4.18.14-alt1. \nSecurity Fix(es):\n\n * BDU:2019-03124: Уязвимость механизма проверки BPF ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2020-00735: Уязвимость функции xenvif_set_hash_mapping гипервизора Xen, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * CVE-2018-15471: An issue was discovered in xenvif_set_hash_mapping in drivers/net/xen-netback/hash.c in the Linux kernel through 4.18.1, as used in Xen through 4.11.x and other products. The Linux netback driver allows frontends to control mapping of requests to request queues. When processing a request to set or change this mapping, some input validation (e.g., for an integer overflow) was missing or flawed, leading to OOB access in hash handling. A malicious or buggy frontend may cause the (usually privileged) backend to make out of bounds memory accesses, potentially resulting in one or more of privilege escalation, Denial of Service (DoS), or information leaks.\n\n * CVE-2018-18445: In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2018-10-16"
},
"Updated": {
"Date": "2018-10-16"
},
"BDUs": [
{
"ID": "BDU:2019-03124",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2019-03124",
"Impact": "High",
"Public": "20181005"
},
{
"ID": "BDU:2020-00735",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125, CWE-190",
"Href": "https://bdu.fstec.ru/vul/2020-00735",
"Impact": "High",
"Public": "20180816"
}
],
"CVEs": [
{
"ID": "CVE-2018-15471",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-15471",
"Impact": "High",
"Public": "20180817"
},
{
"ID": "CVE-2018-18445",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-18445",
"Impact": "High",
"Public": "20181017"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20182490001",
"Comment": "kernel-doc-un is earlier than 1:4.18.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182490002",
"Comment": "kernel-headers-modules-un-def is earlier than 1:4.18.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182490003",
"Comment": "kernel-headers-un-def is earlier than 1:4.18.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182490004",
"Comment": "kernel-image-domU-un-def is earlier than 1:4.18.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182490005",
"Comment": "kernel-image-un-def is earlier than 1:4.18.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182490006",
"Comment": "kernel-modules-drm-ancient-un-def is earlier than 1:4.18.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182490007",
"Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:4.18.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182490008",
"Comment": "kernel-modules-drm-radeon-un-def is earlier than 1:4.18.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182490009",
"Comment": "kernel-modules-drm-un-def is earlier than 1:4.18.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182490010",
"Comment": "kernel-modules-ide-un-def is earlier than 1:4.18.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182490011",
"Comment": "kernel-modules-kvm-un-def is earlier than 1:4.18.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182490012",
"Comment": "kernel-modules-staging-un-def is earlier than 1:4.18.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182490013",
"Comment": "kernel-modules-v4l-un-def is earlier than 1:4.18.14-alt1"
}
]
}
]
}
}
]
}