vuln-list-alt/oval/c9f2/ALT-PU-2018-2699/definitions.json
2024-06-28 13:17:52 +00:00

263 lines
13 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20182699",
"Version": "oval:org.altlinux.errata:def:20182699",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2018-2699: package `kernel-image-mp` update to version 4.19.4-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2018-2699",
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-2699",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-00432",
"RefURL": "https://bdu.fstec.ru/vul/2019-00432",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01052",
"RefURL": "https://bdu.fstec.ru/vul/2019-01052",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01062",
"RefURL": "https://bdu.fstec.ru/vul/2019-01062",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01410",
"RefURL": "https://bdu.fstec.ru/vul/2021-01410",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01437",
"RefURL": "https://bdu.fstec.ru/vul/2021-01437",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03207",
"RefURL": "https://bdu.fstec.ru/vul/2022-03207",
"Source": "BDU"
},
{
"RefID": "CVE-2018-18710",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-18710",
"Source": "CVE"
},
{
"RefID": "CVE-2018-18955",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-18955",
"Source": "CVE"
},
{
"RefID": "CVE-2018-19406",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-19406",
"Source": "CVE"
},
{
"RefID": "CVE-2018-19407",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-19407",
"Source": "CVE"
},
{
"RefID": "CVE-2018-19854",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-19854",
"Source": "CVE"
},
{
"RefID": "CVE-2019-3874",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-3874",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1678",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1678",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-mp to version 4.19.4-alt1. \nSecurity Fix(es):\n\n * BDU:2019-00432: Уязвимость функции map_write() (\u0026amp;quot;kernel/user_namespace.c\u0026amp;quot;) ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2019-01052: Уязвимость функции vcpu_scan_ioapic ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01062: Уязвимость функции crypto_report_one() ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-01410: Уязвимость буфера сокета SCTP ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01437: Уязвимость функции cdrom_ioctl_select_disc (drivers/cdrom/cdrom.c) ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2022-03207: Уязвимость компонента TCP Pace Handler функции tcp_internal_pacing в файле net/ipv4/tcp_output.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2018-18710: An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.\n\n * CVE-2018-18955: In the Linux kernel 4.15.x through 4.19.x before 4.19.2, map_write() in kernel/user_namespace.c allows privilege escalation because it mishandles nested user namespaces with more than 5 UID or GID ranges. A user who has CAP_SYS_ADMIN in an affected user namespace can bypass access controls on resources outside the namespace, as demonstrated by reading /etc/shadow. This occurs because an ID transformation takes place properly for the namespaced-to-kernel direction but not for the kernel-to-namespaced direction.\n\n * CVE-2018-19406: kvm_pv_send_ipi in arch/x86/kvm/lapic.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where the apic map is uninitialized.\n\n * CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.\n\n * CVE-2018-19854: An issue was discovered in the Linux kernel before 4.19.3. crypto_report_one() and related functions in crypto/crypto_user.c (the crypto user configuration API) do not fully initialize structures that are copied to userspace, potentially leaking sensitive memory to user programs. NOTE: this is a CVE-2013-2547 regression but with easier exploitability because the attacker does not need a capability (however, the system must have the CONFIG_CRYPTO_USER kconfig option).\n\n * CVE-2019-3874: The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are believed to be vulnerable.\n\n * CVE-2022-1678: An issue was discovered in the Linux Kernel from 4.18 to 4.19, an improper update of sock reference in TCP pacing can lead to memory/netns leak, which can be used by remote clients.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2018-11-26"
},
"Updated": {
"Date": "2018-11-26"
},
"BDUs": [
{
"ID": "BDU:2019-00432",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20, CWE-863",
"Href": "https://bdu.fstec.ru/vul/2019-00432",
"Impact": "High",
"Public": "20181107"
},
{
"ID": "BDU:2019-01052",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2019-01052",
"Impact": "Low",
"Public": "20181119"
},
{
"ID": "BDU:2019-01062",
"CVSS": "AV:L/AC:M/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-01062",
"Impact": "Low",
"Public": "20181109"
},
{
"ID": "BDU:2021-01410",
"CVSS": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-01410",
"Impact": "Low",
"Public": "20190324"
},
{
"ID": "BDU:2021-01437",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2021-01437",
"Impact": "Low",
"Public": "20181003"
},
{
"ID": "BDU:2022-03207",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401, CWE-911",
"Href": "https://bdu.fstec.ru/vul/2022-03207",
"Impact": "High",
"Public": "20211210"
}
],
"CVEs": [
{
"ID": "CVE-2018-18710",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-18710",
"Impact": "Low",
"Public": "20181029"
},
{
"ID": "CVE-2018-18955",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-863",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-18955",
"Impact": "High",
"Public": "20181116"
},
{
"ID": "CVE-2018-19406",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-19406",
"Impact": "Low",
"Public": "20181121"
},
{
"ID": "CVE-2018-19407",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-19407",
"Impact": "Low",
"Public": "20181121"
},
{
"ID": "CVE-2018-19854",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-19854",
"Impact": "Low",
"Public": "20181204"
},
{
"ID": "CVE-2019-3874",
"CVSS": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3874",
"Impact": "Low",
"Public": "20190325"
},
{
"ID": "CVE-2022-1678",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1678",
"Impact": "High",
"Public": "20220525"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20182699001",
"Comment": "kernel-headers-modules-mp is earlier than 0:4.19.4-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182699002",
"Comment": "kernel-headers-mp is earlier than 0:4.19.4-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182699003",
"Comment": "kernel-image-mp is earlier than 0:4.19.4-alt1"
}
]
}
]
}
}
]
}