2024-06-28 13:17:52 +00:00

197 lines
8.2 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20202982",
"Version": "oval:org.altlinux.errata:def:20202982",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-2982: package `kernel-image-un-def` update to version 5.8.14-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-2982",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-2982",
"Source": "ALTPU"
},
{
"RefID": "BDU:2020-05701",
"RefURL": "https://bdu.fstec.ru/vul/2020-05701",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00284",
"RefURL": "https://bdu.fstec.ru/vul/2021-00284",
"Source": "BDU"
},
{
"RefID": "CVE-2020-25641",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25641",
"Source": "CVE"
},
{
"RefID": "CVE-2020-26541",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-26541",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-un-def to version 5.8.14-alt1. \nSecurity Fix(es):\n\n * BDU:2020-05701: Уязвимость функции iov_iter_copy_from_user_atomic () ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00284: Уязвимость ядра операционной системы Linux, связанная с некорректной проверкой криптографической подписи, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * CVE-2020-25641: A flaw was found in the Linux kernel's implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.\n\n * CVE-2020-26541: The Linux kernel through 5.8.13 does not properly enforce the Secure Boot Forbidden Signature Database (aka dbx) protection mechanism. This affects certs/blacklist.c and certs/system_keyring.c.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-10-09"
},
"Updated": {
"Date": "2020-10-09"
},
"BDUs": [
{
"ID": "BDU:2020-05701",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://bdu.fstec.ru/vul/2020-05701",
"Impact": "Low",
"Public": "20200902"
},
{
"ID": "BDU:2021-00284",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-200, CWE-347",
"Href": "https://bdu.fstec.ru/vul/2021-00284",
"Impact": "Low",
"Public": "20201001"
}
],
"CVEs": [
{
"ID": "CVE-2020-25641",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25641",
"Impact": "Low",
"Public": "20201006"
},
{
"ID": "CVE-2020-26541",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-26541",
"Impact": "Low",
"Public": "20201002"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:kworkstation:10.1",
"cpe:/o:alt:workstation:10.1",
"cpe:/o:alt:server:10.1",
"cpe:/o:alt:server-v:10.1",
"cpe:/o:alt:education:10.1",
"cpe:/o:alt:slinux:10.1",
"cpe:/o:alt:starterkit:10.1",
"cpe:/o:alt:kworkstation:10.2",
"cpe:/o:alt:workstation:10.2",
"cpe:/o:alt:server:10.2",
"cpe:/o:alt:server-v:10.2",
"cpe:/o:alt:education:10.2",
"cpe:/o:alt:slinux:10.2",
"cpe:/o:alt:starterkit:10.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20202982001",
"Comment": "kernel-doc-un is earlier than 1:5.8.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202982002",
"Comment": "kernel-headers-modules-un-def is earlier than 1:5.8.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202982003",
"Comment": "kernel-headers-un-def is earlier than 1:5.8.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202982004",
"Comment": "kernel-image-domU-un-def is earlier than 1:5.8.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202982005",
"Comment": "kernel-image-un-def is earlier than 1:5.8.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202982006",
"Comment": "kernel-modules-drm-ancient-un-def is earlier than 1:5.8.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202982007",
"Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:5.8.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202982008",
"Comment": "kernel-modules-drm-radeon-un-def is earlier than 1:5.8.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202982009",
"Comment": "kernel-modules-drm-un-def is earlier than 1:5.8.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202982010",
"Comment": "kernel-modules-ide-un-def is earlier than 1:5.8.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202982011",
"Comment": "kernel-modules-staging-un-def is earlier than 1:5.8.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202982012",
"Comment": "kernel-modules-v4l-un-def is earlier than 1:5.8.14-alt1"
}
]
}
]
}
}
]
}