vuln-list-alt/oval/p11/ALT-PU-2021-1776/definitions.json
2024-12-12 21:07:30 +00:00

225 lines
10 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20211776",
"Version": "oval:org.altlinux.errata:def:20211776",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2021-1776: package `kernel-image-rpi-un` update to version 5.10.35-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2021-1776",
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-1776",
"Source": "ALTPU"
},
{
"RefID": "BDU:2021-02182",
"RefURL": "https://bdu.fstec.ru/vul/2021-02182",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04260",
"RefURL": "https://bdu.fstec.ru/vul/2021-04260",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04883",
"RefURL": "https://bdu.fstec.ru/vul/2021-04883",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03028",
"RefURL": "https://bdu.fstec.ru/vul/2022-03028",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03139",
"RefURL": "https://bdu.fstec.ru/vul/2022-03139",
"Source": "BDU"
},
{
"RefID": "CVE-2020-25670",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25670",
"Source": "CVE"
},
{
"RefID": "CVE-2020-25671",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25671",
"Source": "CVE"
},
{
"RefID": "CVE-2021-22555",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"Source": "CVE"
},
{
"RefID": "CVE-2021-29154",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154",
"Source": "CVE"
},
{
"RefID": "CVE-2021-29657",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29657",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-rpi-un to version 5.10.35-alt1. \nSecurity Fix(es):\n\n * BDU:2021-02182: Уязвимость компонента BPF JIT (arch/x86/net/bpf_jit_comp.c и arch/x86/net/bpf_jit_comp32.c.) ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-04260: Уязвимость функции xt_compat_target_from_user() (net/netfilter/x_tables.c) подсистемы netfilter операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2021-04883: Уязвимость компонента arch/x86/kvm/svm/nested.c операционной системы Linux , связанная с использованием памяти после её освобождения, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-03028: Уязвимость функции llcp_sock_connect() операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-03139: Уязвимость функции llcp_sock_bind() протокола nfc ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * CVE-2020-25670: A vulnerability was found in Linux Kernel where refcount leak in llcp_sock_bind() causing use-after-free which might lead to privilege escalations.\n\n * CVE-2020-25671: A vulnerability was found in Linux Kernel, where a refcount leak in llcp_sock_connect() causing use-after-free which might lead to privilege escalations.\n\n * CVE-2021-22555: A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space\n\n * CVE-2021-29154: BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.\n\n * CVE-2021-29657: arch/x86/kvm/svm/nested.c in the Linux kernel before 5.11.12 has a use-after-free in which an AMD KVM guest can bypass access control on host OS MSRs when there are nested guests, aka CID-a58d9166a756. This occurs because of a TOCTOU race condition associated with a VMCB12 double fetch in nested_svm_vmrun.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2021-05-10"
},
"Updated": {
"Date": "2021-05-10"
},
"BDUs": [
{
"ID": "BDU:2021-02182",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-77",
"Href": "https://bdu.fstec.ru/vul/2021-02182",
"Impact": "High",
"Public": "20210408"
},
{
"ID": "BDU:2021-04260",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-04260",
"Impact": "High",
"Public": "20210413"
},
{
"ID": "BDU:2021-04883",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-367, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-04883",
"Impact": "High",
"Public": "20210401"
},
{
"ID": "BDU:2022-03028",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-03028",
"Impact": "High",
"Public": "20210325"
},
{
"ID": "BDU:2022-03139",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-03139",
"Impact": "High",
"Public": "20210325"
}
],
"CVEs": [
{
"ID": "CVE-2020-25670",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25670",
"Impact": "High",
"Public": "20210526"
},
{
"ID": "CVE-2020-25671",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25671",
"Impact": "High",
"Public": "20210526"
},
{
"ID": "CVE-2021-22555",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"Impact": "High",
"Public": "20210707"
},
{
"ID": "CVE-2021-29154",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-77",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154",
"Impact": "High",
"Public": "20210408"
},
{
"ID": "CVE-2021-29657",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29657",
"Impact": "High",
"Public": "20210722"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20211776001",
"Comment": "kernel-headers-modules-rpi-un is earlier than 1:5.10.35-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211776002",
"Comment": "kernel-headers-rpi-un is earlier than 1:5.10.35-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211776003",
"Comment": "kernel-image-rpi-un is earlier than 1:5.10.35-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211776004",
"Comment": "kernel-modules-staging-rpi-un is earlier than 1:5.10.35-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211776005",
"Comment": "kernel-modules-v4l-rpi-un is earlier than 1:5.10.35-alt1"
}
]
}
]
}
}
]
}