2024-06-28 13:17:52 +00:00

229 lines
9.8 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20191251",
"Version": "oval:org.altlinux.errata:def:20191251",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2019-1251: package `kernel-image-std-debug` update to version 4.14.101-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2019-1251",
"RefURL": "https://errata.altlinux.org/ALT-PU-2019-1251",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-01346",
"RefURL": "https://bdu.fstec.ru/vul/2019-01346",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01352",
"RefURL": "https://bdu.fstec.ru/vul/2019-01352",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02782",
"RefURL": "https://bdu.fstec.ru/vul/2019-02782",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03996",
"RefURL": "https://bdu.fstec.ru/vul/2019-03996",
"Source": "BDU"
},
{
"RefID": "CVE-2019-3819",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-3819",
"Source": "CVE"
},
{
"RefID": "CVE-2019-6974",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-6974",
"Source": "CVE"
},
{
"RefID": "CVE-2019-7221",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7221",
"Source": "CVE"
},
{
"RefID": "CVE-2019-7222",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7222",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-std-debug to version 4.14.101-alt1. \nSecurity Fix(es):\n\n * BDU:2019-01346: Уязвимость функции kvm_ioctl_create_device ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01352: Уязвимость подсистемы виртуализации Kernel-based Virtual Machine (KVM) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2019-02782: Уязвимость функции hid_debug_events_read () ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03996: Уязвимость ядра операционной системы Linux, связанная с отсутствием защиты служебных данных, позволяющая нарушителю раскрыть защищаемую информацию\n\n * CVE-2019-3819: A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\"root\") can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable.\n\n * CVE-2019-6974: In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.\n\n * CVE-2019-7221: The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.\n\n * CVE-2019-7222: The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2019-02-16"
},
"Updated": {
"Date": "2019-02-16"
},
"BDUs": [
{
"ID": "BDU:2019-01346",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-01346",
"Impact": "High",
"Public": "20190207"
},
{
"ID": "BDU:2019-01352",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-01352",
"Impact": "High",
"Public": "20190207"
},
{
"ID": "BDU:2019-02782",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-835",
"Href": "https://bdu.fstec.ru/vul/2019-02782",
"Impact": "Low",
"Public": "20190124"
},
{
"ID": "BDU:2019-03996",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-03996",
"Impact": "Low",
"Public": "20190207"
}
],
"CVEs": [
{
"ID": "CVE-2019-3819",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3819",
"Impact": "Low",
"Public": "20190125"
},
{
"ID": "CVE-2019-6974",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-6974",
"Impact": "High",
"Public": "20190215"
},
{
"ID": "CVE-2019-7221",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7221",
"Impact": "High",
"Public": "20190321"
},
{
"ID": "CVE-2019-7222",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7222",
"Impact": "Low",
"Public": "20190321"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20191251001",
"Comment": "kernel-headers-modules-std-debug is earlier than 1:4.14.101-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191251002",
"Comment": "kernel-headers-std-debug is earlier than 1:4.14.101-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191251003",
"Comment": "kernel-image-domU-std-debug is earlier than 1:4.14.101-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191251004",
"Comment": "kernel-image-std-debug is earlier than 1:4.14.101-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191251005",
"Comment": "kernel-modules-drm-ancient-std-debug is earlier than 1:4.14.101-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191251006",
"Comment": "kernel-modules-drm-nouveau-std-debug is earlier than 1:4.14.101-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191251007",
"Comment": "kernel-modules-drm-radeon-std-debug is earlier than 1:4.14.101-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191251008",
"Comment": "kernel-modules-drm-std-debug is earlier than 1:4.14.101-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191251009",
"Comment": "kernel-modules-ide-std-debug is earlier than 1:4.14.101-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191251010",
"Comment": "kernel-modules-kvm-std-debug is earlier than 1:4.14.101-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191251011",
"Comment": "kernel-modules-staging-std-debug is earlier than 1:4.14.101-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191251012",
"Comment": "kernel-modules-v4l-std-debug is earlier than 1:4.14.101-alt1"
}
]
}
]
}
}
]
}