vuln-list-alt/oval/c9f2/ALT-PU-2019-1231/definitions.json
2024-06-28 13:17:52 +00:00

249 lines
11 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20191231",
"Version": "oval:org.altlinux.errata:def:20191231",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2019-1231: package `kernel-image-mp` update to version 4.20.8-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2019-1231",
"RefURL": "https://errata.altlinux.org/ALT-PU-2019-1231",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-01183",
"RefURL": "https://bdu.fstec.ru/vul/2019-01183",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01346",
"RefURL": "https://bdu.fstec.ru/vul/2019-01346",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01352",
"RefURL": "https://bdu.fstec.ru/vul/2019-01352",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01406",
"RefURL": "https://bdu.fstec.ru/vul/2019-01406",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02381",
"RefURL": "https://bdu.fstec.ru/vul/2019-02381",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03996",
"RefURL": "https://bdu.fstec.ru/vul/2019-03996",
"Source": "BDU"
},
{
"RefID": "CVE-2019-6974",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-6974",
"Source": "CVE"
},
{
"RefID": "CVE-2019-7221",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7221",
"Source": "CVE"
},
{
"RefID": "CVE-2019-7222",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7222",
"Source": "CVE"
},
{
"RefID": "CVE-2019-7308",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7308",
"Source": "CVE"
},
{
"RefID": "CVE-2019-8956",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-8956",
"Source": "CVE"
},
{
"RefID": "CVE-2019-9003",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9003",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-mp to version 4.20.8-alt1. \nSecurity Fix(es):\n\n * BDU:2019-01183: Уязвимость реализации протокола SCTP ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2019-01346: Уязвимость функции kvm_ioctl_create_device ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01352: Уязвимость подсистемы виртуализации Kernel-based Virtual Machine (KVM) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2019-01406: Уязвимость драйвера интерфейса управления платформой IPMI ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-02381: Уязвимость ядра операционных систем Linux, связанная со смещением указателя за пределы допустимых значений, позволяющая нарушителю реализовать атаки по побочным каналам\n\n * BDU:2019-03996: Уязвимость ядра операционной системы Linux, связанная с отсутствием защиты служебных данных, позволяющая нарушителю раскрыть защищаемую информацию\n\n * CVE-2019-6974: In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.\n\n * CVE-2019-7221: The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.\n\n * CVE-2019-7222: The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.\n\n * CVE-2019-7308: kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks.\n\n * CVE-2019-8956: In the Linux Kernel before versions 4.20.8 and 4.19.21 a use-after-free error in the \"sctp_sendmsg()\" function (net/sctp/socket.c) when handling SCTP_SENDALL flag can be exploited to corrupt memory.\n\n * CVE-2019-9003: In the Linux kernel before 4.20.5, attackers can trigger a drivers/char/ipmi/ipmi_msghandler.c use-after-free and OOPS by arranging for certain simultaneous execution of the code, as demonstrated by a \"service ipmievd restart\" loop.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2019-02-13"
},
"Updated": {
"Date": "2019-02-13"
},
"BDUs": [
{
"ID": "BDU:2019-01183",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2019-01183",
"Impact": "High",
"Public": "20190201"
},
{
"ID": "BDU:2019-01346",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-01346",
"Impact": "High",
"Public": "20190207"
},
{
"ID": "BDU:2019-01352",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-01352",
"Impact": "High",
"Public": "20190207"
},
{
"ID": "BDU:2019-01406",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-01406",
"Impact": "High",
"Public": "20190116"
},
{
"ID": "BDU:2019-02381",
"CVSS": "AV:L/AC:M/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"CWE": "CWE-189, CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-02381",
"Impact": "Low",
"Public": "20190102"
},
{
"ID": "BDU:2019-03996",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-03996",
"Impact": "Low",
"Public": "20190207"
}
],
"CVEs": [
{
"ID": "CVE-2019-6974",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-6974",
"Impact": "High",
"Public": "20190215"
},
{
"ID": "CVE-2019-7221",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7221",
"Impact": "High",
"Public": "20190321"
},
{
"ID": "CVE-2019-7222",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7222",
"Impact": "Low",
"Public": "20190321"
},
{
"ID": "CVE-2019-7308",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"CWE": "CWE-189",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7308",
"Impact": "Low",
"Public": "20190201"
},
{
"ID": "CVE-2019-8956",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-8956",
"Impact": "High",
"Public": "20190401"
},
{
"ID": "CVE-2019-9003",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9003",
"Impact": "High",
"Public": "20190222"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20191231001",
"Comment": "kernel-headers-modules-mp is earlier than 0:4.20.8-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191231002",
"Comment": "kernel-headers-mp is earlier than 0:4.20.8-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191231003",
"Comment": "kernel-image-mp is earlier than 0:4.20.8-alt1"
}
]
}
]
}
}
]
}